10.1 What are three ample mechanisms that malware can use to propagate?
10.2 What are four ample categories of payloads that malware may carry?
10.3 What are archetypal phases of operation of a virus or worm?
10.4 What mechanisms can a virus use to burrow itself?
10.5 What is the aberration amid machine-executable and macro viruses?
10.6 What agency can a bastard use to admission alien systems to propagate?
10.7 What is a “drive-by-download” and how does it alter from a worm?
10.8 What is a “logic bomb”?
10.9 Differentiate amid the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the aforementioned malware?
10.10 List some of the altered levels in a arrangement that a rootkit may use.
10.11 Call some malware antitoxin elements.
10.12 List three places malware acknowledgment mechanisms may be located.
10.13 Briefly call the four ancestors of antivirus software.
10.14 How does behavior-blocking software work?
10.15 What is a broadcast denial-of-service system?
Order a unique copy of this paper