Malware questionnaire-malware can use to propagate

Assignment Help Basic Computer Science
Reference no: EM133050430

1. What are three broad mechanisms that malware can use to propagate?

2. What are four broad categories of payloads that malware may carry?

3. What are typical phases of operation of a virus or worm?

4. What mechanisms can a virus use to conceal itself?

5. What is the difference between machine-executable and macro viruses?

6. What means can a worm use to access remote systems to propagate?

7. What is a "drive-by-download" and how does it differ from a worm?

8. What is a "logic bomb"?

9. Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10. List some of the different levels in a system that a rootkit may use.

11. Describe some malware countermeasure elements.

12. List three places malware mitigation mechanisms may be located.

13. Briefly describe the four generations of antivirus software.

14. How does behavior-blocking software work?

15. What is a distributed denial-of-service system?

Reference no: EM133050430

Questions Cloud

Discuss why mobile application development : Discuss why mobile application development is considered unique in comparison to website development.
Agile methodology : How would an Agile methodology correct some of these problems? What new development cycle would you propose?
About programming variables : Now that we know computers execute the programming statements one line after another, let's learn about programming variables.
Biometric techniques : Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method.
Malware questionnaire-malware can use to propagate : What are three broad mechanisms that malware can use to propagate? What mechanisms can a virus use to conceal itself?
Blockchain make deployments easier or harder : Contrast approaches to deploying traditional applications and blockchain apps. Explain whether blockchain make deployments easier or harder.
Unified communication tools influence knowledge : How do unified communication tools influence knowledge sharing in an organization? Are they better suited for Intranet, Internet, or extranet consumption?
Case of corporate fraud : Identify a case of corporate fraud by finding a current event or by researching historical cases.
Data visualization and gis solutions : Which business units utilize the data presented by the technology? Explain the present and future impacts of such a technology from a business perspective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  About the business strategy

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

  Identify what qualitative indicator would be

Identify what a qualitative indicator would be. Identify what a quantitative indicator would be. Differentiate them and give two examples for each

  Create a chat window using html

Individual: jQuery - Assessment Activity - Week4 - PRG/282 - eCampus Create a chat window using HTML, CSS, and jQuery where you and a customer service representative can chat. with a bot response.

  Recommend a professional organizations for technology

1. Recommend a professional organizations for technology/computer world that will help me an IT student. and tell me why would you recommend it? Having opportunities to attend local meetings, seminars, etc., can allow you to network and get involv..

  Make education a public good

High school education is a positive externality. When we have public high schools we are trying to make education a public good.

  What is the probability of this worst-case scenario

What is the probability of this worst-case scenario?

  Draw the complete game tree for this game

Consider a game tree in which there are six marbles, and players 1 and 2 take turns picking from one to three marbles. The player who takes the last marble loses the game.

  Difference in computer program and programming a computer

Explain the difference between using a computer program and programming a computer. How do you discover syntax errors. How do you discover logic errors. What is the difference between object and object reference

  Knowledge acquisition regarding your computer system

To engage you in the process of achieving the goal of knowledge acquisition regarding your computer system,

  What power in the context of leadership

Discuss what power in the context of leadership is and how it relates to bullying within organizations. Also note how this impacts productivity.

  Describe in detail what security controls are

1. Describe in detail what security controls are, how they are chosen, and how they should be managed once implemented.

  Explaining social network widgets and resaurant locators

The popularity of Apple's iPhone and Application store has made _____ improtant to advertisers, who see social network widgets, resaurant locators.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd