SlideShare a Scribd company logo
10.1 What are three broad mechanisms that malware can use to
propagate?
10.2 What are four broad categories of payloads that malware
may carry?
10.3 What are typical phases of operation of a virus or worm?
10.4 What mechanisms can a virus use to conceal itself?
10.5 What is the difference between machine-executable and
macro viruses?
10.6 What means can a worm use to access remote systems to
propagate?
10.7 What is a “drive-by-download” and how does it differ from
a worm?
10.8 What is a “logic bomb”?
10.9 Differentiate among the following: a backdoor, a bot, a
keylogger, spyware, and a rootkit? Can they all be present in the
same malware?
10.10 List some of the different levels in a system that a rootkit
may use.
10.11 Describe some malware countermeasure elements.
10.12 List three places malware mitigation mechanisms may be
located.
10.13 Briefly describe the four generations of antivirus
software.
10.14 How does behavior-blocking software work?
10.15 What is a distributed denial-of-service system?
including references.
No copy paste please.

More Related Content

Similar to 10.1 What are three broad mechanisms that malware can use to p.docx

Report_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_SpywareReport_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_SpywareShan Kumar
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
jyoti_lakhani
 
Introduction to Malware analysis
Introduction to Malware analysis Introduction to Malware analysis
Introduction to Malware analysis
HusseinMuhaisen
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
IOSR Journals
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internetUltraUploader
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
Jose Manuel Acosta
 
Paper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfPaper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdf
RishikhesanALMuniand
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
Rc Os
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
ManjuA8
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
mastermind07
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
Vishal Tandel
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning Worms
IOSR Journals
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
Pratimesh Pathak
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
SonuRoy30
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdf
Priyank40
 
1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf
aliradios
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
ShubhamKumarClass10t
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
sohail awan
 

Similar to 10.1 What are three broad mechanisms that malware can use to p.docx (20)

Report_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_SpywareReport_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_Spyware
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Introduction to Malware analysis
Introduction to Malware analysis Introduction to Malware analysis
Introduction to Malware analysis
 
H0434651
H0434651H0434651
H0434651
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Paper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfPaper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdf
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning Worms
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdf
 
1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
341 346
341 346341 346
341 346
 

More from novabroom

3 pagesAfter reading the Cybersecurity Act of 2015, address .docx
3 pagesAfter reading the Cybersecurity Act of 2015, address .docx3 pagesAfter reading the Cybersecurity Act of 2015, address .docx
3 pagesAfter reading the Cybersecurity Act of 2015, address .docx
novabroom
 
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx
novabroom
 
3 pagesThis paper should describe, as well as compare and contra.docx
3 pagesThis paper should describe, as well as compare and contra.docx3 pagesThis paper should describe, as well as compare and contra.docx
3 pagesThis paper should describe, as well as compare and contra.docx
novabroom
 
3 assignments listed below1.  In a 350 word essay, compare a.docx
3 assignments listed below1.  In a 350 word essay, compare a.docx3 assignments listed below1.  In a 350 word essay, compare a.docx
3 assignments listed below1.  In a 350 word essay, compare a.docx
novabroom
 
3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx
3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx
3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx
novabroom
 
2Women with a Parasol-Madame Monet and Her SonClau.docx
2Women with a Parasol-Madame Monet and Her SonClau.docx2Women with a Parasol-Madame Monet and Her SonClau.docx
2Women with a Parasol-Madame Monet and Her SonClau.docx
novabroom
 
2The following is a list of some of the resources availabl.docx
2The following is a list of some of the resources availabl.docx2The following is a list of some of the resources availabl.docx
2The following is a list of some of the resources availabl.docx
novabroom
 
3 If you like to develop a computer-based DAQ measurement syst.docx
3  If you like to develop a computer-based DAQ measurement syst.docx3  If you like to develop a computer-based DAQ measurement syst.docx
3 If you like to develop a computer-based DAQ measurement syst.docx
novabroom
 
2BackgroundThe research focuses on investigating leaders fro.docx
2BackgroundThe research focuses on investigating leaders fro.docx2BackgroundThe research focuses on investigating leaders fro.docx
2BackgroundThe research focuses on investigating leaders fro.docx
novabroom
 
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
novabroom
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
novabroom
 
2Megan Bowen02042020 Professor Cozen Comm 146Int.docx
2Megan Bowen02042020 Professor Cozen Comm 146Int.docx2Megan Bowen02042020 Professor Cozen Comm 146Int.docx
2Megan Bowen02042020 Professor Cozen Comm 146Int.docx
novabroom
 
2From On the Advantage and Disadvantage of History for L.docx
2From On the Advantage and Disadvantage of History for L.docx2From On the Advantage and Disadvantage of History for L.docx
2From On the Advantage and Disadvantage of History for L.docx
novabroom
 
28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx
28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx
28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx
novabroom
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
novabroom
 
257Speaking of researchGuidelines for evaluating resea.docx
257Speaking of researchGuidelines for evaluating resea.docx257Speaking of researchGuidelines for evaluating resea.docx
257Speaking of researchGuidelines for evaluating resea.docx
novabroom
 
2800 word count.APA formatplagiarism free paperThe paper.docx
2800 word count.APA formatplagiarism free paperThe paper.docx2800 word count.APA formatplagiarism free paperThe paper.docx
2800 word count.APA formatplagiarism free paperThe paper.docx
novabroom
 
28 CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY Wha.docx
28  CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY  Wha.docx28  CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY  Wha.docx
28 CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY Wha.docx
novabroom
 
261Megaregion Planningand High-Speed RailPetra Tod.docx
261Megaregion Planningand High-Speed RailPetra Tod.docx261Megaregion Planningand High-Speed RailPetra Tod.docx
261Megaregion Planningand High-Speed RailPetra Tod.docx
novabroom
 
250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx
250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx
250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx
novabroom
 

More from novabroom (20)

3 pagesAfter reading the Cybersecurity Act of 2015, address .docx
3 pagesAfter reading the Cybersecurity Act of 2015, address .docx3 pagesAfter reading the Cybersecurity Act of 2015, address .docx
3 pagesAfter reading the Cybersecurity Act of 2015, address .docx
 
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docx
 
3 pagesThis paper should describe, as well as compare and contra.docx
3 pagesThis paper should describe, as well as compare and contra.docx3 pagesThis paper should describe, as well as compare and contra.docx
3 pagesThis paper should describe, as well as compare and contra.docx
 
3 assignments listed below1.  In a 350 word essay, compare a.docx
3 assignments listed below1.  In a 350 word essay, compare a.docx3 assignments listed below1.  In a 350 word essay, compare a.docx
3 assignments listed below1.  In a 350 word essay, compare a.docx
 
3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx
3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx
3 CommunicationChallengesinaDiverse,GlobalMarketpl.docx
 
2Women with a Parasol-Madame Monet and Her SonClau.docx
2Women with a Parasol-Madame Monet and Her SonClau.docx2Women with a Parasol-Madame Monet and Her SonClau.docx
2Women with a Parasol-Madame Monet and Her SonClau.docx
 
2The following is a list of some of the resources availabl.docx
2The following is a list of some of the resources availabl.docx2The following is a list of some of the resources availabl.docx
2The following is a list of some of the resources availabl.docx
 
3 If you like to develop a computer-based DAQ measurement syst.docx
3  If you like to develop a computer-based DAQ measurement syst.docx3  If you like to develop a computer-based DAQ measurement syst.docx
3 If you like to develop a computer-based DAQ measurement syst.docx
 
2BackgroundThe research focuses on investigating leaders fro.docx
2BackgroundThe research focuses on investigating leaders fro.docx2BackgroundThe research focuses on investigating leaders fro.docx
2BackgroundThe research focuses on investigating leaders fro.docx
 
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
 
2Megan Bowen02042020 Professor Cozen Comm 146Int.docx
2Megan Bowen02042020 Professor Cozen Comm 146Int.docx2Megan Bowen02042020 Professor Cozen Comm 146Int.docx
2Megan Bowen02042020 Professor Cozen Comm 146Int.docx
 
2From On the Advantage and Disadvantage of History for L.docx
2From On the Advantage and Disadvantage of History for L.docx2From On the Advantage and Disadvantage of History for L.docx
2From On the Advantage and Disadvantage of History for L.docx
 
28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx
28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx
28 jOURNAL Of MULTICULTURAL COUNSELING AND DEVELOpMENT • Janua.docx
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
 
257Speaking of researchGuidelines for evaluating resea.docx
257Speaking of researchGuidelines for evaluating resea.docx257Speaking of researchGuidelines for evaluating resea.docx
257Speaking of researchGuidelines for evaluating resea.docx
 
2800 word count.APA formatplagiarism free paperThe paper.docx
2800 word count.APA formatplagiarism free paperThe paper.docx2800 word count.APA formatplagiarism free paperThe paper.docx
2800 word count.APA formatplagiarism free paperThe paper.docx
 
28 CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY Wha.docx
28  CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY  Wha.docx28  CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY  Wha.docx
28 CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY Wha.docx
 
261Megaregion Planningand High-Speed RailPetra Tod.docx
261Megaregion Planningand High-Speed RailPetra Tod.docx261Megaregion Planningand High-Speed RailPetra Tod.docx
261Megaregion Planningand High-Speed RailPetra Tod.docx
 
250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx
250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx
250 WORDS Moyer Instruments is a rapidly growing manufacturer .docx
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 

10.1 What are three broad mechanisms that malware can use to p.docx

  • 1. 10.1 What are three broad mechanisms that malware can use to propagate? 10.2 What are four broad categories of payloads that malware may carry? 10.3 What are typical phases of operation of a virus or worm? 10.4 What mechanisms can a virus use to conceal itself? 10.5 What is the difference between machine-executable and macro viruses? 10.6 What means can a worm use to access remote systems to propagate? 10.7 What is a “drive-by-download” and how does it differ from a worm? 10.8 What is a “logic bomb”? 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware? 10.10 List some of the different levels in a system that a rootkit may use. 10.11 Describe some malware countermeasure elements. 10.12 List three places malware mitigation mechanisms may be located.
  • 2. 10.13 Briefly describe the four generations of antivirus software. 10.14 How does behavior-blocking software work? 10.15 What is a distributed denial-of-service system? including references. No copy paste please.