List the Following Briefly 4 sentences
Cherry1234- 10.1 What are three broad mechanisms that malware can use to propagate?
- 10.2 What are four broad categories of payloads that malware may carry?
- 10.3 What are typical phases of operation of a virus or worm?
- 10.4 What mechanisms can a virus use to conceal itself?
- 10.5 What is the difference between machine-executable and macro viruses?
- 10.6 What means can a worm use to access remote systems to propagate?
- 10.7 What is a “drive-by-download” and how does it differ from a worm?
- 10.8 What is a “logic bomb”?
- 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
- 10.10 List some of the different levels in a system that a rootkit may use.
- 10.11 Describe some malware countermeasure elements.
- 10.12 List three places malware mitigation mechanisms may be located.
- 10.13 Briefly describe the four generations of antivirus software.
- 10.14 How does behavior-blocking software work?
- 10.15 What is a distributed denial-of-service system?
- 3 years ago
- 6
Answer(1)
Purchase the answer to view it
NOT RATED
- DiscussionQuestions.docx
other Questions(10)
- Journal Article Critique
- Response to discussion question 4
- human resource management
- my financelab
- MARKET ENTRY STRATEGIES
- i need some help in essay ( high school level ) only not colleage about environment
- Multiple Choice Question
- Research paper
- Read 2
- Provide reasoning and examples for how accounting software is useful in making sound business and financial decisions. Instructions: Please utilize the information you have learned so far in this class and your prior accounting courses to complete this me