Match each item with a statement below.
A. Network of robot computers
B. A program that usually hides in the OS tools, so it's almost impossible to detect
C. A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
D. An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
E. An attack that prevents legitimate users from accessing network resources
F. Attackers inject themselves between two parties or systems communicating with one another
G. Hardware devices or software that can be used to capture keystrokes on a computer
H. Malicious software introduced into a network to help an attacker accomplish their goals
I. Malicious program that attaches itself to a file or another program
J. Virus that locks a target system until a demanded fee is paid
A. botnet
B. rootkit
C. Trojan
D. Ping of Death
E. DoS
F. Man-in-the-Middle
G. keyloggers
H. malware
I. virus
J. ransomware
You might also like to view...
How much RAM is supported by the 32-bit version of Windows 10.
A. 4 GB B. 2048 GB C. 64 GB D. 16 GB
What is the chart element called that classifies the patterns or colors that are assigned to the categories in the chart?
A) Series B) Marker C) Legend D) Label
In the Task Manager, the program iexplore.exe refers to:
A) Internet Explorer B) File search application C) File Explorer D) Print manager program
What are the types of tickets and servers used in Kerberos?
What will be an ideal response?