SlideShare a Scribd company logo
1 of 2
10.1 What are three broad mechanisms that malware can use to
propagate?
10.2 What are four broad categories of payloads that malware
may carry?
10.3 What are typical phases of operation of a virus or worm?
10.4 What mechanisms can a virus use to conceal itself?
10.5 What is the difference between machine-executable and
macro viruses?
10.6 What means can a worm use to access remote systems to
propagate?
10.7 What is a “drive-by-download” and how does it differ from
a worm?
10.8 What is a “logic bomb”?
10.9 Differentiate among the following: a backdoor, a bot, a
keylogger, spyware, and a rootkit? Can they all be present in the
same malware?
10.10 List some of the different levels in a system that a rootkit
may use.
10.11 Describe some malware countermeasure elements.
10.12 List three places malware mitigation mechanisms may be
located.
10.13 Briefly describe the four generations of antivirus
software.
10.14 How does behavior-blocking software work?
10.15 What is a distributed denial-of-service system?

More Related Content

Similar to 10.1 What are three broad mechanisms that malware can use to propa.docx

Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
Security threats explained
Security threats explained Security threats explained
Security threats explained Abhijeet Karve
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...IOSR Journals
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Paper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfPaper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfRishikhesanALMuniand
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its typesVishal Tandel
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
Introduction to Malware analysis
Introduction to Malware analysis Introduction to Malware analysis
Introduction to Malware analysis HusseinMuhaisen
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsIOSR Journals
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internetUltraUploader
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primerManjuA8
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptxSonuRoy30
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfPriyank40
 
1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdfaliradios
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Pratimesh Pathak
 

Similar to 10.1 What are three broad mechanisms that malware can use to propa.docx (20)

Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
H0434651
H0434651H0434651
H0434651
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Paper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdfPaper-ComputerWormClassification.pdf
Paper-ComputerWormClassification.pdf
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Introduction to Malware analysis
Introduction to Malware analysis Introduction to Malware analysis
Introduction to Malware analysis
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning Worms
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
341 346
341 346341 346
341 346
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdf
 
1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf1.What type of malware gathers user activity data without user conse.pdf
1.What type of malware gathers user activity data without user conse.pdf
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 

More from trippettjettie

1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docx1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docxtrippettjettie
 
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docxtrippettjettie
 
1004.1.8 Multicultural Empires and the New World (through 15.docx
1004.1.8  Multicultural Empires and the New World (through 15.docx1004.1.8  Multicultural Empires and the New World (through 15.docx
1004.1.8 Multicultural Empires and the New World (through 15.docxtrippettjettie
 
10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docx10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docxtrippettjettie
 
100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docx100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docxtrippettjettie
 
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docxtrippettjettie
 
10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docx10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docxtrippettjettie
 
10 Learning & Leading with Technology February 2012The .docx
10 Learning & Leading with Technology  February 2012The .docx10 Learning & Leading with Technology  February 2012The .docx
10 Learning & Leading with Technology February 2012The .docxtrippettjettie
 
10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docx10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docxtrippettjettie
 
10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docx10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docxtrippettjettie
 
10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docx10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docxtrippettjettie
 
1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docx1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docxtrippettjettie
 
100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docx100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docxtrippettjettie
 
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docxtrippettjettie
 
100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docx100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docxtrippettjettie
 
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docxtrippettjettie
 
100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docx100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docxtrippettjettie
 
100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docx100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docxtrippettjettie
 
10-K 1 f12312012-10k.htm 10-K .docx
10-K 1 f12312012-10k.htm 10-K                               .docx10-K 1 f12312012-10k.htm 10-K                               .docx
10-K 1 f12312012-10k.htm 10-K .docxtrippettjettie
 
100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docx100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docxtrippettjettie
 

More from trippettjettie (20)

1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docx1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docx
 
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
 
1004.1.8 Multicultural Empires and the New World (through 15.docx
1004.1.8  Multicultural Empires and the New World (through 15.docx1004.1.8  Multicultural Empires and the New World (through 15.docx
1004.1.8 Multicultural Empires and the New World (through 15.docx
 
10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docx10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docx
 
100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docx100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docx
 
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
 
10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docx10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docx
 
10 Learning & Leading with Technology February 2012The .docx
10 Learning & Leading with Technology  February 2012The .docx10 Learning & Leading with Technology  February 2012The .docx
10 Learning & Leading with Technology February 2012The .docx
 
10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docx10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docx
 
10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docx10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docx
 
10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docx10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docx
 
1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docx1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docx
 
100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docx100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docx
 
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
 
100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docx100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docx
 
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
 
100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docx100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docx
 
100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docx100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docx
 
10-K 1 f12312012-10k.htm 10-K .docx
10-K 1 f12312012-10k.htm 10-K                               .docx10-K 1 f12312012-10k.htm 10-K                               .docx
10-K 1 f12312012-10k.htm 10-K .docx
 
100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docx100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docx
 

Recently uploaded

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

10.1 What are three broad mechanisms that malware can use to propa.docx

  • 1. 10.1 What are three broad mechanisms that malware can use to propagate? 10.2 What are four broad categories of payloads that malware may carry? 10.3 What are typical phases of operation of a virus or worm? 10.4 What mechanisms can a virus use to conceal itself? 10.5 What is the difference between machine-executable and macro viruses? 10.6 What means can a worm use to access remote systems to propagate? 10.7 What is a “drive-by-download” and how does it differ from a worm? 10.8 What is a “logic bomb”? 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware? 10.10 List some of the different levels in a system that a rootkit may use. 10.11 Describe some malware countermeasure elements. 10.12 List three places malware mitigation mechanisms may be located. 10.13 Briefly describe the four generations of antivirus
  • 2. software. 10.14 How does behavior-blocking software work? 10.15 What is a distributed denial-of-service system?