CISA Certified Information Systems Auditor – Question1858

Gimmes often work through:

A.
SMS
B. IRC chat
C. email attachment
D. news
E. file download
F. None of the choices.

Correct Answer: C

Explanation:

Explanation:
Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse, gimmes can arrive as an email attachment promising anything. The recipient is expected to give in to the need to the program and open the attachment. In addition, many users will blindly click on any attachments they receive that seem even mildly legitimate.