Maxine Francesca P. De Guzman
OLSU22A3 SU202100577
1st YR. BSP
IT01 ACTIVITY #9:
Instruction: Identify the word/s that is being describe in the following
statement.
1. It is a type of malicious software program that spread throughout the
computer files without the knowledge of a user.
COMPUTER VIRUS
2. It is a type of malware whose primary function is to replicate itself to
spread to uninfected computers.
COMPUTER WORM
3. It is a malicious program that occurs unexpected changes to computer
setting and unusual activity, even when the computer should be idle.
TROJAN HORSE
4. It is a method that bypasses the normal authentication process.
BACKDOORS
5. It is an automated process that interacts with other network services.
BOTS
6. It is a security attack on a user session over a protected network.
SESSION HIJACKING
7. It is a type of attack which attempts to steal sensitive information like
user login credentials and credit card number.
PHISHING
8. It is a type of attack which uses a trial and error method.
BRUTE FORCE
9. It is an attack which meant to make a server or network resource
unavailable to the users.
DENIAL OF SERVICE
10. This type of attack stored the list of a commonly used password and
validated them to get original password.
DICTIONARY ATTACKS
OLSU22A3 SU202100577
1st YR. BSP
IT01 ACTIVITY #9:
Instruction: Identify the word/s that is being describe in the following
statement.
1. It is a type of malicious software program that spread throughout the
computer files without the knowledge of a user.
COMPUTER VIRUS
2. It is a type of malware whose primary function is to replicate itself to
spread to uninfected computers.
COMPUTER WORM
3. It is a malicious program that occurs unexpected changes to computer
setting and unusual activity, even when the computer should be idle.
TROJAN HORSE
4. It is a method that bypasses the normal authentication process.
BACKDOORS
5. It is an automated process that interacts with other network services.
BOTS
6. It is a security attack on a user session over a protected network.
SESSION HIJACKING
7. It is a type of attack which attempts to steal sensitive information like
user login credentials and credit card number.
PHISHING
8. It is a type of attack which uses a trial and error method.
BRUTE FORCE
9. It is an attack which meant to make a server or network resource
unavailable to the users.
DENIAL OF SERVICE
10. This type of attack stored the list of a commonly used password and
validated them to get original password.
DICTIONARY ATTACKS