One of the forms of malicious code is a worm. Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.
What will be an ideal response?
- A computer worm is malicious software designed to spread from computer to computer over local area networks and the Internet. Unlike viruses, computer worms are not attached to host programs and run independently. Worms deliver payloads that vary from harmless messages to malicious file deletions.
- A mass-mailing worm makes use of information on an infected computer to mail itself to everyone listed in a user's e-mail address book.
- A denial of service attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.
You might also like to view...
What is the value of x after the following statement? float x; x = 3.0 / 4.0 + (3 + 2 )/ 5
a. 5.75 b. 5.75 c. 1.75 d. 3.75
catch blocks are not required to contain:
a. Braces { }. b. Parentheses ( ). c. Some form of parameter type indication. d. A parameter name.
Jim is implementing an IDaaS solution for his organization. What type of technology is he putting in place?
A. Identity as a service B. Employee ID as a service C. Intrusion detection as a service D. OAuth
Netiquette refers to good manners and proper behaviors when communicating through electronic media. ____________________
Answer the following statement true (T) or false (F)