Match each item with a statement below.

A. Network of robot computers
B. A program that usually hides in the OS tools, so it's almost impossible to detect
C. A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
D. An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
E. An attack that prevents legitimate users from accessing network resources
F. Attackers inject themselves between two parties or systems communicating with one another
G. Hardware devices or software that can be used to capture keystrokes on a computer
H. Malicious software introduced into a network to help an attacker accomplish their goals
I. Malicious program that attaches itself to a file or another program
J. Virus that locks a target system until a demanded fee is paid


A. botnet
B. rootkit
C. Trojan
D. Ping of Death
E. DoS
F. Man-in-the-Middle
G. keyloggers
H. malware
I. virus
J. ransomware

Computer Science & Information Technology

You might also like to view...

How much RAM is supported by the 32-bit version of Windows 10.

A. 4 GB B. 2048 GB C. 64 GB D. 16 GB

Computer Science & Information Technology

What is the chart element called that classifies the patterns or colors that are assigned to the categories in the chart?

A) Series B) Marker C) Legend D) Label

Computer Science & Information Technology

In the Task Manager, the program iexplore.exe refers to:

A) Internet Explorer B) File search application C) File Explorer D) Print manager program

Computer Science & Information Technology

What are the types of tickets and servers used in Kerberos?

What will be an ideal response?

Computer Science & Information Technology