Malicious software constitutes one of the most significant...
A zombie is a program activated on an infected machine that...
Newer worms are limited to Windows machines
A polymorphic virus creates copies during replication that...
_________ can result in pop-up ads or redirection of a browser to a...
Microsoft Word, Excel files, and Adobe PDF are document files...
Viruses often morph to evade detection.
As an alternative to just destroying data, some malware encrypts the...
A _________ attack is an attack on a computer system or network that...
Unsolicited bulk e-mail, commonly known as ________, imposes...
A backdoor is any mechanism that bypasses a normal...
Many forms of infection can be blocked by denying normal users...
A ________ lies dormant until a predefined condition is met; the...
Worms cannot spread through shared media, such as USB ...
_________ is software that collects information from a computer and...
A _________ , also known as a trapdoor, is a secret entry point into a...
A virus, although attached to an executable program, cannot...
During the __________ phase the virus places a copy of itself into...
A Worm typically uses the __________.
Malware can be put into two broad categories, based first on...
To replicate itself, a worm uses some means to access...
The _________ is the event or condition that determines when the...
A _________ is a computer program that can run independently and can...
There are _________ generations of antivirus software.
_________ is software (macro, or other portable instruction) that can...
A__________ is a program that installs other items on a machine that...
A _________ is malware that, when executed, tries to replicate itself...
A __________ is a set of hacker tools used after an attacker has...
A ________ is a computer program that appears to have a useful...
_________ capture keystrokes on a compromised system.
A(n) _________ virus is a form of virus explicitly designed to hide...
___________ programs are used to send large volumes of unwanted...
Usually, a downloader is sent in an e-mail.
A __________ virus is a virus that mutates with every infection,...
A _________ attack exploits social engineering to leverage a user's...
A _________ is a set of programs installed on a system to maintain...
The _________ method uses information contained on an infected...
Propagation mechanisms include system corruption, bots, phishing,...
_________program activated on an infected machine that is activated to...
In a ________ attack the attacker is able to implant zombiesoftware on...
Set of tools for generating new virus automatically
The earliest significant worm infection was released onto the Internet...
Another approach to exploiting software vulnerabilities...
The first function in the propagation phase for a network worm is for...
A __________ uses multiple methods of infection or propagation,...
Payloads include those used by viruses, worms, and trojans.
Is a malicious hacker tools used to break into machines remotely
________ viruses infect scripting code used to support active content...