subject

For each term, enter a number in the Answer column that corresponds to its proper description. For example, spam is "undesirable and unsolicited email that often involves fraud or includes malware," which is number 11.Malware Description Term Answer1. A hidden way to bypass access controls Spam ans112. A browser add-on that contains some type of malware Rootkit3. Self-replicating software program that remotely infects computers across networks Virus4. Software that displays unsolicited or unwanted advertisements Backdoor5. Malware that attempts to generate funds from a computer user Phishing6. An executable program that attaches to, or infects, other executable programs and then replicates to infect yet more programs Ransomware7. A condition that prevents system from handling current and new requests Keystroke logger8. Code that executes a hidden payload when certain conditions or time constraints are met Worm9. A program that captures user entries and then forwards that information to an attacker Trojan horse10. Any program that masquerades as a useful program while hiding its malicious intent Botnet11. Undesirable and unsolicited email that often involves fraud or includes malware Adware12. An attack that tricks users into revealing credentials or confidential information Logic bomb13. A robotically controlled network used to launch attacks Injection14. A software program that conceals presence and disguises system compromise Denial of service15. Software that invades computers or observes usage habits without permission Spyware16. An action in which malicious software provides deliberately invalid input to some other software to cause an error condition, allowing an attack to occur Malicious add-on.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 21:30
Elements such as fonts colors visual structure graphics and the interface of a web page should complement each other to ensure blank
Answers: 3
question
Computers and Technology, 22.06.2019 22:00
Perform the following tasks: a. create a class named testclass that holds a single private integer field and a public constructor. the only statement in the constructor is one that displays the message “constructing”. write a main()function that instantiates one object of the testclass. save the file as testclass.cpp in the chapter 08 folder. run the program and observe the results. b. write another main()function that instantiates an array of 10 testclass objects. save the file as test class array.c . run this program and observe the results.
Answers: 1
question
Computers and Technology, 23.06.2019 01:20
Me with this program in c++ ! computers represent color by combining sub-colors red, green, and blue (rgb). each sub-color's value can range from 0 to 255. thus (255, 0, 0) is bright red. (130, 0, 130) is a medium purple. (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (in other word, equal amounts of red, green, blue yield gray).given values for red, green, and blue, remove the gray part. ex: if the input is 130 50 130, the output is: 80 0 80. thus, find the smallest value, and then subtract it from all three values, thus removing the gray.
Answers: 3
question
Computers and Technology, 23.06.2019 15:00
Jake really works well with numbers and is skilled with computers but doesn't work well with others. which of the jobs discussed in this unit might be best for jake? why?
Answers: 3
You know the right answer?
For each term, enter a number in the Answer column that corresponds to its proper description. For e...
Questions
question
Social Studies, 27.07.2019 09:00
Questions on the website: 13722360