(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of malicious software steals computing power, network bandwidth, and storage capacity?

  1. Blockchains

  2. Virus

  3. Botnets

  4. Spyware

The correct answer is: Botnets

The correct choice is botnets, which are a network of compromised computers controlled by an attacker. These systems, often infected with malicious software, can be used to perform a variety of tasks, including stealing computing power, network bandwidth, and storage capacity from the infected devices. Botnets can execute distributed denial-of-service (DDoS) attacks, mine cryptocurrencies, or participate in other malicious activities without the awareness or consent of the device owners. In contrast, while viruses are designed to spread from one computer to another and can cause harm to systems, they typically do not focus specifically on utilizing resources in the way that botnets do. Blockchains refer to a decentralized ledger technology that securely records transactions and does not inherently possess malicious properties. Spyware is designed to monitor user behavior and collect sensitive information but does not primarily aim to hijack computing resources. Hence, botnets are distinct in their purpose and functionality, making them the correct answer in this context.