Malicious software-what is logic bomb

Assignment Help Basic Computer Science
Reference no: EM132516572

1. What are three broad mechanisms that malware can use to propagate?

2. What are four broad categories of payloads that malware may carry?

3. What are typical phases of operation of a virus or worm?

4. What mechanisms can a virus use to conceal itself?

5. What is the difference between machine-executable and macro viruses?

6. What means can a worm use to access remote systems to propagate?

7. What is a "drive-by-download" and how does it differ from a worm?

8. What is a "logic bomb"?

9. Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10. List some of the different levels in a system that a rootkit may use.

11. Describe some malware countermeasure elements.

12. List three places malware mitigation mechanisms may be located.

13. Briefly describe the four generations of antivirus software.

14. How does behavior-blocking software work?

15. What is a distributed denial-of-service system?

Reference no: EM132516572

Questions Cloud

Quality improvement : Describe the problem or issue and propose a quality improvement initiative based on evidence-based practice.
Access controls procedure guide : Create a guide that security personnel will use that includes procedures for implementing an access control change.
Component functions and communication flows : System architecture is the descriptive representation of the system's component functions and the communication flows between those components.
Why is the coefficient of variation important : Why is the coefficient of variation important? What do we mean when we say the coefficient of variation has no units?
Malicious software-what is logic bomb : What are three broad mechanisms that malware can use to propagate? What is a "logic bomb"? Describe some malware countermeasure elements.
Importance of databases and database management systems : Describe the importance of databases and database management systems in managing organizational data and information
Use of biometrics is invasion of privacy : Many people believe that the use of biometrics is an invasion of privacy. An eye scanning device records the inner structure of a person's eye
Business drivers for information security policies : You would not want to. Taking risks and making a return on those risks are essential to business. How you manage that risk is what makes businesses successful.
Ethical hacking-generally found on the darknet : What type pf content is generally found on the Darknet? What kind of information can be found using the hiddenwiki?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a report on challenges of an online business

Write a report on Challenges of an Online Business, Technology and Privacy - You may change or refine this topic further down the road. So don't worry about it being a temporary one.

  Show that a huffman tree can be constructed in linear time

Given a Huffman coding tree, which algorithm would you use to get the codewords for all the symbols? What is its time-efficiency class as a function of the alphabet size?

  Display all of the jobs from different sites geographically

Display all of the jobs from different sites geographically

  Draw a flowchart or write pseudocodeto

Draw a flowchart or write pseudocodeto represent the logic of a program that allows the user to enter two values. The program outputs the product of the two values.

  Centralized or decentralized account

Is an account created in Window 7 VM a centralized or decentralized account. If you wanted to log onto a second computer using the same username and password, what would you need to do first?

  Prove by induction that the recursive form

Prove by induction that the recursive form and the closed form are equal to each other

  What is the equation of the epipolar line

Write the proof you should use an English sentence to explain why these particular equations are true - what is the equation of the epipolar line in these three situations?

  It security policy for handling user accounts

Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

  Contents of the hash table that results

Give the contents of the hash table that results when keys E1 A S1 YQUE2 S2 TION are inserted in that order into an initially empty 13-item hash table using double hashing (use h(k) = k mod 13 for the hash function for the k-th letter of the alpha..

  Review the literature and examine the strengths and

cloud computing and virtualization are two relatively new technologies which have re-emerged and which are both making

  Organization for the prohibition of chemical weapons

Make a powerpoint presentation about the The Organization for the Prohibition of Chemical Weapons, OPCW.org based in Hague: Background and current issues.

  Review the wbs and gantt chart you created for tasks

Review the WBS and Gantt chart you created for Tasks Propose three to five additional activities that would help you estimate resources and durations. Write a one-page paper describing these new activities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd