100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

MIST 356 EXAM SCRIPT UPDATED QUESTIONS AND ANSWERS GRADED A.pdf

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
05-01-2026
Written in
2025/2026

MIST 356 EXAM SCRIPT UPDATED QUESTIONS AND ANSWERS GRADED A.pdf

Institution
Mist
Course
Mist









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Mist
Course
Mist

Document information

Uploaded on
January 5, 2026
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MIST 356 EXAM SCRIPT UPDATED QUESTIONS AND
ANSWERS GRADED A+
✔✔Viruses - ✔✔a code that runs on a computer typically without the user's knowledge;
Disguised as legitimate programs; Can be embedded within legitimate software; Usually
requires user input.

✔✔Boot Sector Virus - ✔✔Loads into the first sector of the hard drive, when the
computer boots, the virus is loaded into memory and gets executed

✔✔Macro Virus - ✔✔usually embedded or bundled in documents requiring the user to
execute

✔✔Program-based Virus - ✔✔usually embedded within a program

✔✔Encrypted Virus - ✔✔uses self-encryption to hide detection by ant-virus software

✔✔Polymorphic Virus - ✔✔a virus that changes or updates its code to avoid detection
by any-viruses

✔✔Metamorphic Virus - ✔✔Polymorphic on steroids. A virus completely changes itself
regularly as it infects new files. These are very difficult to write.

✔✔Armored Virus - ✔✔Makes false obvious copies of itself to trick anti-viruses to go
after the copies instead of the original virus

✔✔Worms - ✔✔similar to a virus, except it self-replicates, meaning, once the worm is
executed it can spread from system to system across the network without any user
input; Very dangerous and takes advantage of network security vulnerabilities.

✔✔Ransomware - ✔✔software that restricts access to a computer system or data until
a pre-defined "ransom" is paid to the attacker. Typically done to gain money

✔✔Trojans (Trojan Horse) - ✔✔malicious programs that disguise themselves as
legitimate programs but are actually doing bad stuff behind the scenes. They are not
viruses, but operate in a similar manner.

✔✔Trojan Downloader - ✔✔downloads malicious programs onto a computer without the
user's knowledge or input

✔✔Spyware - ✔✔a type of malicious software that is usually installed alongside of third-
party software. Usually runs silently in the background, unnoticed by the user. Collects
information, ranging from websites you like to access to recording your keystrokes

, ✔✔Rootkits - ✔✔a program that is designed to gain administrative or "root" privileges
over a system without being detected. Rootkits are typically very small, and are often
undetected by many anti-virus or anti-malware software

✔✔Spamware - ✔✔software that hipjacks your email client or your email address itself
to further propagate spam messages

✔✔RATs (Remote Access Trojans) - ✔✔elevates privileges to allow an attacker to gain
administrative or elevated control of a system

✔✔DDOS Trojan - ✔✔tries to overload a computer's processor by placing requests or
commands at a high frequency

✔✔Malware Delivery Methods - ✔✔- Via software, messaging, and media
- Botnets and zombies
- Active interception
- Privilege escalation
- Backdoors
- Logic Bombs

✔✔Botnets - ✔✔are groups of compromised computers that have been taken over by a
master computer that sends out malicious software to unsuspecting individuals.
Computers taken over by botnets are called 'Zombies'.

✔✔Privilege Escalation - ✔✔exploiting a bug or flaw in the operating system or system
firmware to gain access over resources

✔✔Logic Bomb - ✔✔code that has been either injected or pre-placed into software that
is meant to incur a malicious event

✔✔OS Firewalls - ✔✔a good first line of defense. Not perfect. Network firewalls are very
important too.

✔✔Data Segregation - ✔✔most systems have the operating systems installed to a
single drive. If data is important, try to segment to a different driver, either a physical
local drive or network drive

✔✔HIDS - ✔✔loaded on an individual computer. Analyses and monitors what happens
inside that computer

✔✔NIDS - ✔✔can be loaded on individual computers, or it can be loaded on network
appliances. Or it can be a physical stand-alone network device itself

✔✔In-Line - ✔✔all network traffic flows through the NIDS

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BOARDWALK Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
183
Member since
1 year
Number of followers
7
Documents
25069
Last sold
11 hours ago
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.7

33 reviews

5
14
4
6
3
7
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions