Match the type of malicious code attack method in Column 1 to its key components in Column 2

Column 1 Column 2
9. Trojan Horse a. Pieces of code that are secretly installed or implanted into a system
10. Virus b. Copy themselves to a system and then execute various operations
11. Worms c. A program that appears to be legitimate but launches a malware
program

12. Logic Bombs d. Are activated when a certain computer activity is performed


13. b
14. a
15. d.
16. c

Criminal Justice

You might also like to view...

In the second half of the 19th century, emphasis shifted from reform schools to the:

a. wilderness program b. boot camp model c. cottage system d. electronic monitoring system

Criminal Justice

Which of the following is a disadvantage of the police baton?

A) The police officer must be within striking distance. B) It is easy to use and train for its use. C) It is light weight. D) It is versatile.

Criminal Justice

Which of the following is regulated by the U.S. legislature due to its use in making meth?

a. food additives b. powdered baby formula c. cold medicines d. cosmetics

Criminal Justice

What is the initial appearance? What is its purpose?

What will be an ideal response?

Criminal Justice