100% Solved
A self-replicating/distributing and self-propagating malware that is a standalone executable
program that carries out unauthorized activity on a victim's device Correct answer-
worms
A node/bridge on a network that serves as a portal to other networks. Correct answer-
gateway
This malware self-replicates itself on the host device, and it can't spread itself from one device
to another. They spread via exchanging infected files. Correct answer-virus
It's main purpose is to disguise malware as legitimate software. It can't spread itself to other
devices and it CANT SELF-REPLICATE. Correct answer-Trojan
a device or software that is designed to block unauthorized access while allowing authorized
communications Correct answer-firewall
device that connects networks and allows devices to communicate with each other within those
networks Correct answer-Router
A device that allows computers to connect to the internet Correct answer-Modem
, IT 105 Final GMU 2024; Questions & Answers
100% Solved
This transport protocol is connection based and connection must be established prior to actual
data transfer occurring Correct answer-TCP (Transmission Control Protocol)
This transport protocol is in connectionless and transmission occurs on a best-effort basis, with
an acknowledgment flowing back only after transmission was initiated Correct answer-
UDP (User Datagram Protocol)
the method of transmitting the bits one after another along a single path. It is slow, cost-
effective, has relatively few errors, and is practical for long distances. Correct answer-
Serial transmission
the method of transmitting a group of bits at a single instant in time, which requires multiple
paths. It is fast (higher data transfer rate) but expensive, and it is practical only for short
distances. Correct answer-Parallel transmission
This refers to any computer program designed to surreptitiously (secretly) enter a digital device.
Correct answer-Malware
The action carried out by malware code is referred to as a Correct answer-Payload
this encryption function involve the use of one key Correct answer-Private-key