Exercise 11.12

themathkid's version from 2015-11-23 15:28


Question Answer
Malicious software that executes when a specified event occurs, such as logging into a bank account logic bombs
Malware sent by email that can be a virus, Trojan horse, worms, logic bombs, or botsspam
Malware disguised as a legitimate program Trojan horse
Tiny pieces of programming code that install them- selves on an infected computer called a zombie and transmit data back to the hackers’ computers without awareness of the zombie computer userbots
Relatively small programs that infect other application software by attaching to it and disturbing application functioning viruses
Similar to viruses except they do not need a host application to function or reproduceworms

Recent badges