Difficulty: Easy
Correct Answer: Opening e-mail attachments
Explanation:
Introduction / Context:
Malware often relies on social engineering to trick users into running malicious code. E-mail remains a major attack vector because attachments can hide executable payloads or macro-enabled documents.
Given Data / Assumptions:
Concept / Approach:
Malicious attachments or links inside e-mails can deliver trojans, ransomware, spyware, and worms. When a user opens or enables macros, the code runs with the user’s privileges, infecting the machine. Safe practices include verifying sender identity, scanning attachments, and disabling automatic macro execution.
Step-by-Step Solution:
Identify which listed action executes untrusted code → opening e-mail attachments.Recognize that merely “sending e-mail” does not infect your own PC.Other options (season, shopping online) are not causal without downloading or running unsafe files.
Verification / Alternative check:
Incident response data repeatedly shows phishing with malicious attachments as a leading initial infection vector; security awareness training targets this risk.
Why Other Options Are Wrong:
Sending e-mails — benign unless sending malware to others, which still requires execution to infect.Winter usage — weather does not install malware.Shopping online — generally safe over HTTPS unless you download/run malicious files; risk lies in downloads, not the act itself.
Common Pitfalls:
Trusting attachments from spoofed senders; enabling macros in “invoices” or “resumes.” Always preview, scan, and verify before opening files.
Final Answer:
Opening e-mail attachments
Discussion & Comments