What mechanisms can a virus use to conceal itself

Assignment Help Other Subject
Reference no: EM132430888

Assignment: In 2-3 lines describe the following

1. What are three broad mechanisms that malware can use to propagate?

2. What are four broad categories of payloads that malware may carry?

3. What are typical phases of operation of a virus or worm?

4. What mechanisms can a virus use to conceal itself?

5. What is the difference between machine-executable and macro viruses?

6. What means can a worm use to access remote systems to propagate?

7. What is a "drive-by-download" and how does it differ from a worm?

8. What is a "logic bomb"?

9. Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10. List some of the different levels in a system that a rootkit may use.

11. Describe some malware countermeasure elements.

12. List three places malware mitigation mechanisms may be located.

13. Briefly describe the four generations of antivirus software.

14. How does behavior-blocking software work?

15. What is a distributed denial-of-service system?

Reference no: EM132430888

Questions Cloud

How would you explain the correlation in given situation : How would you explain the correlation between the amount of corruption in a country and economic development. Using 300-350 words, write a brief discussion.
Complete the end-of-June adjusting entries for Cain Company : Can you show me how to complete the end-of-June adjusting entries for Cain Company using the following columns: General Journal, Debit, and Credit
Why the rate of cellular respiration is different : COMPARING VITAMIN C CONTENT IN DIFFERENT FRUITS IN VARIOUS TEMPERATURES - data needs to be primary and for bio ia the experiment also needs to be carried
Creating a comfortable environment for teenage girls : Identify two opening exercises that you might recommend for a group of adolescent girls who were victims of human trafficking.
What mechanisms can a virus use to conceal itself : What mechanisms can a virus use to conceal itself? What is the difference between machine-executable and macro viruses? What is a "logic bomb"?
Crime reorganize and launch counter attack against terrorist : What are the moral and ethical implications of such an attack? As the lead law enforcement officer in the county, how would you proceed
What is Mike outside tax basis in his LLC interest : Dana and Mike decide to form their new motorcycle business as a LLC. What is Mike's outside tax basis in his LLC interest
What types of information are we concerned with protecting : Why is information security important and what types of information are we concerned with protecting? What is the Gramm-Leach-Bliley Act?
Relying on disbursement of inhalation anthrax : How was this vaccine developed, and how is it administered? How will this impact future terrorism efforts relying on disbursement of inhalation anthrax?

Reviews

Write a Review

Other Subject Questions & Answers

  Describe the evolution of hospitals and sources of law

Describe the evolution of hospitals and sources of law. Use technology and information resources to research issues in healthcare policy, law, and ethics.

  Reflect on your work history

What do you remember most about this time period? What are, or were, the various personal and professional factors that helped to shape these feelings?

  How can geographical models

How can geographical models like Von Thunen's Isolated State model help better understand a place that we are studying? What are the shortcomings of these models?

  Differences between two theoretical perspectives

Compare and contrast the similarities and differences between these two theoretical perspectives.

  Is the anger usually directed at individual people

When researching this topic, some questions to consider in your response may include: Do your results parallel those of James Averill (see textbook), who found that most people become at least mildly angry several times a week, and sometimes sever..

  How could such boundary violations negatively affect

Discuss at least three ways a counselor might demonstrate poor boundaries with a client. Provide examples to illustrate each form of boundary violation.

  Define the terms sex gender and sexuality

The question is related to Sociology and the question is explores the definition of terms sex, gender and sexuality. The terms gender, sex and sexuality have definite or standard meanings in Sociology.

  Write critical review which assesses book-s strenghts

"Write a critical review which assesses book's strenghts and weaknesses, focusing on one or more of following issues: methods concerning his sources.

  Popular during the interwar period

Why were more "extreme" ideologies (such as communism and fascism) so popular during the interwar period?

  Create problems for walt disney in opening parks overseas

Explain how socio-cultural differences create problems for Walt Disney in opening parks overseas.

  Analysis of yields derived from uk government bonds

The project's aim is to perform an analysis of yields derived from UK government bonds, and evaluate the ability of specific bonds to hedge a hypothetical liability

  Undercover in a chicken factory

The attached article is about a field study in Arkansas. Discuss the cultural identity and the conditions of the newest wave of immigrants into the US and Arkansas.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd