ISACA Exam Questions

Gimmes often work through:

Gimmes often work through:

A.
SMS

B.
IRC chat

C.
email attachment

D.
news

E.
file download

F.
None of the choices.

Explanation:
Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse,
gimmes can arrive as an email attachment promising anything. The recipient is expected to give in to
the need to the program and open the attachment. In addition, many users will blindly click on any
attachments they receive that seem even mildly legitimate.