SlideShare a Scribd company logo
1 of 6
Download to read offline
Ans.1
A path, the general form of the name of a file or directory, specifies a unique location in a
filesystem. A path points to a file system location by following the directory tree
hierarchyexpressed in a string of characters in which path components, separated by a
delimitingcharacter, represent each directory.
The delimiting character is most commonly the slash ("/"),the backslash character (""), or
colon (":"), though some operating systems may use a differentdelimiter. Paths are used
extensively in computer science to represent the directory/filerelationships common in modern
operating systems, and are essential in the construction ofUniform Resource Locators
(URLs).Systems can use either absolute or relative paths.
A full path or absolute path is a path thatpoints to the same location on one file system regardless
of the working directory or combinedpaths. It is usually written in reference to a root directory.
Ans.2
An operating system provides four access rights for files and most other resources:
• Create a new instance of the resource (for example, a new file).
• Read the contents of a particular resource.
• Update or write ” or “modify” a particular resource.
• Delete or destroy an existing resource.
The names of these four rights form the acronym CRUD While the four rights also may apply to
RAM and processes, its more common for programs to apply them to files. When a process tries
to create or use a file, it inherits whatever rights belong to the user who started the process. Some
systems also provide a right to append to a file; that is, add data to the end of the file without
reading its contents. There also may be an execute right.
Ans. 8
Computer worms are similar to viruses in that they replicate functional copies of themselves and
can cause the same type of damage. In contrast to viruses, which require the spreading of an
infected host file, worms are standalone software and do not require a host program or human
help to propagate.A Trojan is another type of malware named after the wooden horse the Greeks
used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically
tricked into loading and executing it on their systems. After it is activated, it can achieve any
number of attacks on the host, from irritating the user (popping up windows or changing
desktops) to damaging the host (deleting files, stealing data, or activating and spreading other
malware, such as viruses). Trojans are also known to create back doors to give malicious users
access to the system.
Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-
replicate. Trojans must spread through user interaction such as opening an e-mail attachment or
downloading and running a file from the Internet.
ans. 18
"Malware" is a term for any software that gets installed on your machine and performs
unwanted tasks, often for some third party's benefit. Malware programs can range from being
simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g.,
stealing passwords and data or infecting other machines on the network). Additionally, some
malware programs are designed to transmit information about your web-browsing habits to
advertisers or other third party interests without you knowing.
Types of malware
Some categories of malware are:
How malware gets through
Malware writers are very experienced in using tricks to get users to download their malware.
Software that comes bundled with "other software" is often called a "Trojan Horse." For
example, an instant messenger software could be bundled with a program such as WildTangent,
a known spyware offender. Peer-to-peer file sharing software bundle various types of malware
that are categorized as spyware or adware. Software that promises to speed up your internet
connection or assist with downloads (e.g., My Web Search) will often contain adware. Another
common way to infect a computer is through email containing a seemingly benign link or email
attachment.
Malware can exploit security holes in your browser as a way of invading your machine.
Sometimes websites state that software is needed to view the site, in an attempt to trick users into
clicking "Yes," thus installing software onto their machines. Another trick is if you click
"No," many error windows display. Other sites will tell you that using a certificate makes their
site "safe" which is not the case. Certificate verification means only that the company that
wrote the software is the same as the company whose name appears on the download prompt.
Some malware provides no uninstall option, and installs code in unexpected and hidden places
(e.g., the Windows registry) or modifies the operating system, thus making it more difficult to
remove.
ans. 12
A vendor follows the general steps of reporting, investigation, development, test, and release of a
software patch.An example of microsoft is explained hereby.
Microsoft uses our membership in the Organization for Internet Safety to strongly promote the
principles of responsible reporting. A central principle is the belief that the best way to minimize
customer risk is for security researchers to work closely with vendors to identify issues and fix
them before they are publicized.
When Microsoft releases a patch concurrently with an announcement of a vulnerability, it is a
result of having identified the issue and worked through the patch release process prior to
communicating publicly. This means our customers will have an opportunity to protect
themselves from malicious hackers seeking to exploit the vulnerability. However, when
vulnerabilities are announced publicly at the same time Microsoft is notified, customers remain
exposed to malicious attackers.
Once a potential issue is reported to Microsoft, either privately or publicly, our team immediately
begins an investigation to reproduce and verify the reported issue and to identify any associated
or variant issues. Historically, only about 1 out of 10 reported issues turns out to be a new and
unique security issue that warrants opening an investigation, while the other 9 fall into categories
of known issues, non-security issues, or errors.
If an issue is replicable, a priority is assigned to it and potential fixes, mitigations, and
workarounds are developed. We’ve learned over time that mitigations and workarounds are very
important for empowering users to control when and how they manage their risk. Chartered with
defining and implementing the process for responding to reported software security issues, the
Microsoft Security Response Center works closely with the affected product group to do this
investigation, and, further, to expand the investigation to other supported versions of products so
that we can gain a complete understanding of how an issue may affect customers.
Solution
Ans.1
A path, the general form of the name of a file or directory, specifies a unique location in a
filesystem. A path points to a file system location by following the directory tree
hierarchyexpressed in a string of characters in which path components, separated by a
delimitingcharacter, represent each directory.
The delimiting character is most commonly the slash ("/"),the backslash character (""), or
colon (":"), though some operating systems may use a differentdelimiter. Paths are used
extensively in computer science to represent the directory/filerelationships common in modern
operating systems, and are essential in the construction ofUniform Resource Locators
(URLs).Systems can use either absolute or relative paths.
A full path or absolute path is a path thatpoints to the same location on one file system regardless
of the working directory or combinedpaths. It is usually written in reference to a root directory.
Ans.2
An operating system provides four access rights for files and most other resources:
• Create a new instance of the resource (for example, a new file).
• Read the contents of a particular resource.
• Update or write ” or “modify” a particular resource.
• Delete or destroy an existing resource.
The names of these four rights form the acronym CRUD While the four rights also may apply to
RAM and processes, its more common for programs to apply them to files. When a process tries
to create or use a file, it inherits whatever rights belong to the user who started the process. Some
systems also provide a right to append to a file; that is, add data to the end of the file without
reading its contents. There also may be an execute right.
Ans. 8
Computer worms are similar to viruses in that they replicate functional copies of themselves and
can cause the same type of damage. In contrast to viruses, which require the spreading of an
infected host file, worms are standalone software and do not require a host program or human
help to propagate.A Trojan is another type of malware named after the wooden horse the Greeks
used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically
tricked into loading and executing it on their systems. After it is activated, it can achieve any
number of attacks on the host, from irritating the user (popping up windows or changing
desktops) to damaging the host (deleting files, stealing data, or activating and spreading other
malware, such as viruses). Trojans are also known to create back doors to give malicious users
access to the system.
Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-
replicate. Trojans must spread through user interaction such as opening an e-mail attachment or
downloading and running a file from the Internet.
ans. 18
"Malware" is a term for any software that gets installed on your machine and performs
unwanted tasks, often for some third party's benefit. Malware programs can range from being
simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g.,
stealing passwords and data or infecting other machines on the network). Additionally, some
malware programs are designed to transmit information about your web-browsing habits to
advertisers or other third party interests without you knowing.
Types of malware
Some categories of malware are:
How malware gets through
Malware writers are very experienced in using tricks to get users to download their malware.
Software that comes bundled with "other software" is often called a "Trojan Horse." For
example, an instant messenger software could be bundled with a program such as WildTangent,
a known spyware offender. Peer-to-peer file sharing software bundle various types of malware
that are categorized as spyware or adware. Software that promises to speed up your internet
connection or assist with downloads (e.g., My Web Search) will often contain adware. Another
common way to infect a computer is through email containing a seemingly benign link or email
attachment.
Malware can exploit security holes in your browser as a way of invading your machine.
Sometimes websites state that software is needed to view the site, in an attempt to trick users into
clicking "Yes," thus installing software onto their machines. Another trick is if you click
"No," many error windows display. Other sites will tell you that using a certificate makes their
site "safe" which is not the case. Certificate verification means only that the company that
wrote the software is the same as the company whose name appears on the download prompt.
Some malware provides no uninstall option, and installs code in unexpected and hidden places
(e.g., the Windows registry) or modifies the operating system, thus making it more difficult to
remove.
ans. 12
A vendor follows the general steps of reporting, investigation, development, test, and release of a
software patch.An example of microsoft is explained hereby.
Microsoft uses our membership in the Organization for Internet Safety to strongly promote the
principles of responsible reporting. A central principle is the belief that the best way to minimize
customer risk is for security researchers to work closely with vendors to identify issues and fix
them before they are publicized.
When Microsoft releases a patch concurrently with an announcement of a vulnerability, it is a
result of having identified the issue and worked through the patch release process prior to
communicating publicly. This means our customers will have an opportunity to protect
themselves from malicious hackers seeking to exploit the vulnerability. However, when
vulnerabilities are announced publicly at the same time Microsoft is notified, customers remain
exposed to malicious attackers.
Once a potential issue is reported to Microsoft, either privately or publicly, our team immediately
begins an investigation to reproduce and verify the reported issue and to identify any associated
or variant issues. Historically, only about 1 out of 10 reported issues turns out to be a new and
unique security issue that warrants opening an investigation, while the other 9 fall into categories
of known issues, non-security issues, or errors.
If an issue is replicable, a priority is assigned to it and potential fixes, mitigations, and
workarounds are developed. We’ve learned over time that mitigations and workarounds are very
important for empowering users to control when and how they manage their risk. Chartered with
defining and implementing the process for responding to reported software security issues, the
Microsoft Security Response Center works closely with the affected product group to do this
investigation, and, further, to expand the investigation to other supported versions of products so
that we can gain a complete understanding of how an issue may affect customers.

More Related Content

Similar to Ans.1A path, the general form of the name of a file or directory, .pdf

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Final Project _Smart Utilities
Final Project _Smart UtilitiesFinal Project _Smart Utilities
Final Project _Smart Utilities
Pasan Alagiyawanna
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
bebo
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 

Similar to Ans.1A path, the general form of the name of a file or directory, .pdf (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Unit 7
Unit 7Unit 7
Unit 7
 
Malware
MalwareMalware
Malware
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Final Project _Smart Utilities
Final Project _Smart UtilitiesFinal Project _Smart Utilities
Final Project _Smart Utilities
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Information security
Information securityInformation security
Information security
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 

More from APMRETAIL

#include iostream #include string #include invalidHr.h.pdf
 #include iostream #include string #include invalidHr.h.pdf #include iostream #include string #include invalidHr.h.pdf
#include iostream #include string #include invalidHr.h.pdf
APMRETAIL
 
The start of the European Colonization is typically dated to 1492, a.pdf
The start of the European Colonization is typically dated to 1492, a.pdfThe start of the European Colonization is typically dated to 1492, a.pdf
The start of the European Colonization is typically dated to 1492, a.pdf
APMRETAIL
 
Sewage before being disposed of either in river stream or on land, h.pdf
Sewage before being disposed of either in river stream or on land, h.pdfSewage before being disposed of either in river stream or on land, h.pdf
Sewage before being disposed of either in river stream or on land, h.pdf
APMRETAIL
 
Relational database was proposed by Edgar Codd (of IBM Research) aro.pdf
Relational database was proposed by Edgar Codd (of IBM Research) aro.pdfRelational database was proposed by Edgar Codd (of IBM Research) aro.pdf
Relational database was proposed by Edgar Codd (of IBM Research) aro.pdf
APMRETAIL
 
I hereby explain the SDU (service data unit )and PDU ( protocol data.pdf
I hereby explain the SDU (service data unit )and PDU ( protocol data.pdfI hereby explain the SDU (service data unit )and PDU ( protocol data.pdf
I hereby explain the SDU (service data unit )and PDU ( protocol data.pdf
APMRETAIL
 

More from APMRETAIL (20)

The Periodic table of elements are classified through color dependi.pdf
 The Periodic table of elements are classified through color dependi.pdf The Periodic table of elements are classified through color dependi.pdf
The Periodic table of elements are classified through color dependi.pdf
 
#include iostream #include string #include invalidHr.h.pdf
 #include iostream #include string #include invalidHr.h.pdf #include iostream #include string #include invalidHr.h.pdf
#include iostream #include string #include invalidHr.h.pdf
 
option D) answer A and B are both correct .pdf
                     option   D) answer A and B are both correct      .pdf                     option   D) answer A and B are both correct      .pdf
option D) answer A and B are both correct .pdf
 
image not visible clearly. please give points to .pdf
                     image not visible clearly. please give points to .pdf                     image not visible clearly. please give points to .pdf
image not visible clearly. please give points to .pdf
 
HI(g) has the highest molar entropy as it has h.pdf
                     HI(g)  has the highest molar entropy  as it has h.pdf                     HI(g)  has the highest molar entropy  as it has h.pdf
HI(g) has the highest molar entropy as it has h.pdf
 
ion-dipole Solution ion-.pdf
                     ion-dipole  Solution                     ion-.pdf                     ion-dipole  Solution                     ion-.pdf
ion-dipole Solution ion-.pdf
 
Yes. It has SP2 hybridisation , with 2 lone pairs.pdf
                     Yes. It has SP2 hybridisation , with 2 lone pairs.pdf                     Yes. It has SP2 hybridisation , with 2 lone pairs.pdf
Yes. It has SP2 hybridisation , with 2 lone pairs.pdf
 
Using, M1V1 = M2V2 10.0 x 0.1106 = M2 x 13.64 M.pdf
                     Using, M1V1 = M2V2  10.0 x 0.1106 = M2 x 13.64  M.pdf                     Using, M1V1 = M2V2  10.0 x 0.1106 = M2 x 13.64  M.pdf
Using, M1V1 = M2V2 10.0 x 0.1106 = M2 x 13.64 M.pdf
 
O=C=O .pdf
                     O=C=O                                      .pdf                     O=C=O                                      .pdf
O=C=O .pdf
 
The start of the European Colonization is typically dated to 1492, a.pdf
The start of the European Colonization is typically dated to 1492, a.pdfThe start of the European Colonization is typically dated to 1492, a.pdf
The start of the European Colonization is typically dated to 1492, a.pdf
 
The institutions which act as mediator between savers and boorrowers.pdf
The institutions which act as mediator between savers and boorrowers.pdfThe institutions which act as mediator between savers and boorrowers.pdf
The institutions which act as mediator between savers and boorrowers.pdf
 
Solution Mitochondria is known as power house of the cell.It prod.pdf
Solution Mitochondria is known as power house of the cell.It prod.pdfSolution Mitochondria is known as power house of the cell.It prod.pdf
Solution Mitochondria is known as power house of the cell.It prod.pdf
 
Sewage before being disposed of either in river stream or on land, h.pdf
Sewage before being disposed of either in river stream or on land, h.pdfSewage before being disposed of either in river stream or on land, h.pdf
Sewage before being disposed of either in river stream or on land, h.pdf
 
Relational database was proposed by Edgar Codd (of IBM Research) aro.pdf
Relational database was proposed by Edgar Codd (of IBM Research) aro.pdfRelational database was proposed by Edgar Codd (of IBM Research) aro.pdf
Relational database was proposed by Edgar Codd (of IBM Research) aro.pdf
 
Option “D” is not true about the net neutrality.Favouring of net n.pdf
Option “D” is not true about the net neutrality.Favouring of net n.pdfOption “D” is not true about the net neutrality.Favouring of net n.pdf
Option “D” is not true about the net neutrality.Favouring of net n.pdf
 
NaF will dissociate 100, and therefore the F- will have extra 0.25 .pdf
NaF will dissociate 100, and therefore the F- will have extra 0.25 .pdfNaF will dissociate 100, and therefore the F- will have extra 0.25 .pdf
NaF will dissociate 100, and therefore the F- will have extra 0.25 .pdf
 
CO2 because the heaviest would have the most attr.pdf
                     CO2 because the heaviest would have the most attr.pdf                     CO2 because the heaviest would have the most attr.pdf
CO2 because the heaviest would have the most attr.pdf
 
Intensity of light source Io = 1000 countsIntensity after absorpti.pdf
Intensity of light source Io = 1000 countsIntensity after absorpti.pdfIntensity of light source Io = 1000 countsIntensity after absorpti.pdf
Intensity of light source Io = 1000 countsIntensity after absorpti.pdf
 
I hereby explain the SDU (service data unit )and PDU ( protocol data.pdf
I hereby explain the SDU (service data unit )and PDU ( protocol data.pdfI hereby explain the SDU (service data unit )and PDU ( protocol data.pdf
I hereby explain the SDU (service data unit )and PDU ( protocol data.pdf
 
Hop1 = 13, p2 = 13, and p3 = 13Ha at least one p is not equal.pdf
Hop1 = 13, p2 = 13, and p3 = 13Ha at least one p is not equal.pdfHop1 = 13, p2 = 13, and p3 = 13Ha at least one p is not equal.pdf
Hop1 = 13, p2 = 13, and p3 = 13Ha at least one p is not equal.pdf
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Ans.1A path, the general form of the name of a file or directory, .pdf

  • 1. Ans.1 A path, the general form of the name of a file or directory, specifies a unique location in a filesystem. A path points to a file system location by following the directory tree hierarchyexpressed in a string of characters in which path components, separated by a delimitingcharacter, represent each directory. The delimiting character is most commonly the slash ("/"),the backslash character (""), or colon (":"), though some operating systems may use a differentdelimiter. Paths are used extensively in computer science to represent the directory/filerelationships common in modern operating systems, and are essential in the construction ofUniform Resource Locators (URLs).Systems can use either absolute or relative paths. A full path or absolute path is a path thatpoints to the same location on one file system regardless of the working directory or combinedpaths. It is usually written in reference to a root directory. Ans.2 An operating system provides four access rights for files and most other resources: • Create a new instance of the resource (for example, a new file). • Read the contents of a particular resource. • Update or write ” or “modify” a particular resource. • Delete or destroy an existing resource. The names of these four rights form the acronym CRUD While the four rights also may apply to RAM and processes, its more common for programs to apply them to files. When a process tries to create or use a file, it inherits whatever rights belong to the user who started the process. Some systems also provide a right to append to a file; that is, add data to the end of the file without reading its contents. There also may be an execute right. Ans. 8 Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate.A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-
  • 2. replicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet. ans. 18 "Malware" is a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party's benefit. Malware programs can range from being simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network). Additionally, some malware programs are designed to transmit information about your web-browsing habits to advertisers or other third party interests without you knowing. Types of malware Some categories of malware are: How malware gets through Malware writers are very experienced in using tricks to get users to download their malware. Software that comes bundled with "other software" is often called a "Trojan Horse." For example, an instant messenger software could be bundled with a program such as WildTangent, a known spyware offender. Peer-to-peer file sharing software bundle various types of malware that are categorized as spyware or adware. Software that promises to speed up your internet connection or assist with downloads (e.g., My Web Search) will often contain adware. Another common way to infect a computer is through email containing a seemingly benign link or email attachment. Malware can exploit security holes in your browser as a way of invading your machine. Sometimes websites state that software is needed to view the site, in an attempt to trick users into clicking "Yes," thus installing software onto their machines. Another trick is if you click "No," many error windows display. Other sites will tell you that using a certificate makes their site "safe" which is not the case. Certificate verification means only that the company that wrote the software is the same as the company whose name appears on the download prompt. Some malware provides no uninstall option, and installs code in unexpected and hidden places (e.g., the Windows registry) or modifies the operating system, thus making it more difficult to remove. ans. 12 A vendor follows the general steps of reporting, investigation, development, test, and release of a software patch.An example of microsoft is explained hereby. Microsoft uses our membership in the Organization for Internet Safety to strongly promote the principles of responsible reporting. A central principle is the belief that the best way to minimize customer risk is for security researchers to work closely with vendors to identify issues and fix them before they are publicized.
  • 3. When Microsoft releases a patch concurrently with an announcement of a vulnerability, it is a result of having identified the issue and worked through the patch release process prior to communicating publicly. This means our customers will have an opportunity to protect themselves from malicious hackers seeking to exploit the vulnerability. However, when vulnerabilities are announced publicly at the same time Microsoft is notified, customers remain exposed to malicious attackers. Once a potential issue is reported to Microsoft, either privately or publicly, our team immediately begins an investigation to reproduce and verify the reported issue and to identify any associated or variant issues. Historically, only about 1 out of 10 reported issues turns out to be a new and unique security issue that warrants opening an investigation, while the other 9 fall into categories of known issues, non-security issues, or errors. If an issue is replicable, a priority is assigned to it and potential fixes, mitigations, and workarounds are developed. We’ve learned over time that mitigations and workarounds are very important for empowering users to control when and how they manage their risk. Chartered with defining and implementing the process for responding to reported software security issues, the Microsoft Security Response Center works closely with the affected product group to do this investigation, and, further, to expand the investigation to other supported versions of products so that we can gain a complete understanding of how an issue may affect customers. Solution Ans.1 A path, the general form of the name of a file or directory, specifies a unique location in a filesystem. A path points to a file system location by following the directory tree hierarchyexpressed in a string of characters in which path components, separated by a delimitingcharacter, represent each directory. The delimiting character is most commonly the slash ("/"),the backslash character (""), or colon (":"), though some operating systems may use a differentdelimiter. Paths are used extensively in computer science to represent the directory/filerelationships common in modern operating systems, and are essential in the construction ofUniform Resource Locators (URLs).Systems can use either absolute or relative paths. A full path or absolute path is a path thatpoints to the same location on one file system regardless of the working directory or combinedpaths. It is usually written in reference to a root directory. Ans.2 An operating system provides four access rights for files and most other resources: • Create a new instance of the resource (for example, a new file).
  • 4. • Read the contents of a particular resource. • Update or write ” or “modify” a particular resource. • Delete or destroy an existing resource. The names of these four rights form the acronym CRUD While the four rights also may apply to RAM and processes, its more common for programs to apply them to files. When a process tries to create or use a file, it inherits whatever rights belong to the user who started the process. Some systems also provide a right to append to a file; that is, add data to the end of the file without reading its contents. There also may be an execute right. Ans. 8 Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate.A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self- replicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet. ans. 18 "Malware" is a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party's benefit. Malware programs can range from being simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network). Additionally, some malware programs are designed to transmit information about your web-browsing habits to advertisers or other third party interests without you knowing. Types of malware Some categories of malware are: How malware gets through Malware writers are very experienced in using tricks to get users to download their malware. Software that comes bundled with "other software" is often called a "Trojan Horse." For example, an instant messenger software could be bundled with a program such as WildTangent, a known spyware offender. Peer-to-peer file sharing software bundle various types of malware
  • 5. that are categorized as spyware or adware. Software that promises to speed up your internet connection or assist with downloads (e.g., My Web Search) will often contain adware. Another common way to infect a computer is through email containing a seemingly benign link or email attachment. Malware can exploit security holes in your browser as a way of invading your machine. Sometimes websites state that software is needed to view the site, in an attempt to trick users into clicking "Yes," thus installing software onto their machines. Another trick is if you click "No," many error windows display. Other sites will tell you that using a certificate makes their site "safe" which is not the case. Certificate verification means only that the company that wrote the software is the same as the company whose name appears on the download prompt. Some malware provides no uninstall option, and installs code in unexpected and hidden places (e.g., the Windows registry) or modifies the operating system, thus making it more difficult to remove. ans. 12 A vendor follows the general steps of reporting, investigation, development, test, and release of a software patch.An example of microsoft is explained hereby. Microsoft uses our membership in the Organization for Internet Safety to strongly promote the principles of responsible reporting. A central principle is the belief that the best way to minimize customer risk is for security researchers to work closely with vendors to identify issues and fix them before they are publicized. When Microsoft releases a patch concurrently with an announcement of a vulnerability, it is a result of having identified the issue and worked through the patch release process prior to communicating publicly. This means our customers will have an opportunity to protect themselves from malicious hackers seeking to exploit the vulnerability. However, when vulnerabilities are announced publicly at the same time Microsoft is notified, customers remain exposed to malicious attackers. Once a potential issue is reported to Microsoft, either privately or publicly, our team immediately begins an investigation to reproduce and verify the reported issue and to identify any associated or variant issues. Historically, only about 1 out of 10 reported issues turns out to be a new and unique security issue that warrants opening an investigation, while the other 9 fall into categories of known issues, non-security issues, or errors. If an issue is replicable, a priority is assigned to it and potential fixes, mitigations, and workarounds are developed. We’ve learned over time that mitigations and workarounds are very important for empowering users to control when and how they manage their risk. Chartered with defining and implementing the process for responding to reported software security issues, the Microsoft Security Response Center works closely with the affected product group to do this
  • 6. investigation, and, further, to expand the investigation to other supported versions of products so that we can gain a complete understanding of how an issue may affect customers.