Match each item with a statement below.

A. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
B. An attacker who controls a botnet
C. A logical computer network of zombies under the control of an attacker
D. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability
E. Hardware or software designed to limit the spread of malware
F. Computer code that lies dormant until it is triggered by a specific logical event
G. A database of viruses that is used to identify an infected file
H. A malicious program designed to enter a computer via a network
I. An infected computer that is under the remote control of an attacker


A. adware
B. bot herder
C. botnet
D. feature update
E. firewall
F. logic bomb
G. signature file
H. worm
I. zombie

Computer Science & Information Technology

You might also like to view...

Which technique is known as the simplest form of subnet masking in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments?

A. constant-length subnet masking B. firewall C. dot squad D. anycast

Computer Science & Information Technology

With subscription software, you pay a fee to use the software for a certain time period.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

No exception is thrown if you attempt to close or open a file that does not exist.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_____ is a server-side scripting language.?

A. ?PHP (Hypertext Preprocessor) B. ?ASP (Active Server Pages) C. ?Practical Extraction and Report Language (PERL) D. ?TypeScript (TS)

Computer Science & Information Technology