subject

For each term, enter a number in the Answer column that corresponds to its proper description. For example, spam is "undesirable and unsolicited email that often involves fraud or includes malware," which is number 11.Malware Description Term Answer1. A hidden way to bypass access controls Spam ans112. A browser add-on that contains some type of malware Rootkit3. Self-replicating software program that remotely infects computers across networks Virus4. Software that displays unsolicited or unwanted advertisements Backdoor5. Malware that attempts to generate funds from a computer user Phishing6. An executable program that attaches to, or infects, other executable programs and then replicates to infect yet more programs Ransomware7. A condition that prevents system from handling current and new requests Keystroke logger8. Code that executes a hidden payload when certain conditions or time constraints are met Worm9. A program that captures user entries and then forwards that information to an attacker Trojan horse10. Any program that masquerades as a useful program while hiding its malicious intent Botnet11. Undesirable and unsolicited email that often involves fraud or includes malware Adware12. An attack that tricks users into revealing credentials or confidential information Logic bomb13. A robotically controlled network used to launch attacks Injection14. A software program that conceals presence and disguises system compromise Denial of service15. Software that invades computers or observes usage habits without permission Spyware16. An action in which malicious software provides deliberately invalid input to some other software to cause an error condition, allowing an attack to occur Malicious add-on.

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 09:30, eiza666
My mom and i are moving and we don’t have wifi for the next week, i want to know if using a using a hotspot with unlimited data is better than using regular wifi. i’m considering cost, speed, and data sacrifices.
Answers: 1
image
Computers and Technology, 22.06.2019 23:30, keviongardner
The next button in the review section shows the next available comment. next slide with no comment. previous comment. edited comment.
Answers: 1
image
Computers and Technology, 23.06.2019 07:00, sugaree95
What are three software programs for mobile computing?
Answers: 1
image
Computers and Technology, 23.06.2019 14:00, shawn423
How are stop motion special effects in animated films created
Answers: 1
You know the right answer?
For each term, enter a number in the Answer column that corresponds to its proper description. For e...

Questions in other subjects: