100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CPSC 4200 Exam 2,

Puntuación
-
Vendido
-
Páginas
10
Grado
A+
Subido en
23-11-2025
Escrito en
2025/2026

Exam of 10 pages for the course CPSC 4200 at CPSC 4200 (CPSC 4200 Exam 2)

Institución
CPSC 4200
Grado
CPSC 4200









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CPSC 4200
Grado
CPSC 4200

Información del documento

Subido en
23 de noviembre de 2025
Número de páginas
10
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CPSC 4200 Exam 2 With Correct
Responces

Chapter nn6 nn- nnMalware

What nnare nnthree nnbroad nnmechanisms nnthat nnmalware nncan nnuse nnto nnpropagate?
nn- nnCORRECT✅✅infection nnof nnexisting nnexecutable nnor nninterpreted nncontent nnby
nnviruses nnthat nnis nnsubsequently nnspread nnto nnother nnsystems;
exploit nnof nnsoftware nnvulnerabilities nneither nnlocally nnor nnover nna nnnetwork nnby
nnworms nnor nndrive-by-downloads nnto nnallow nnthe nnmalware nnto nnreplicate; nnand
social nnengineering nnattacks nnthat nnconvince nnusers nnto nnbypass nnsecurity
nnmechanisms nnto nninstall nntrojans, nnor nnto nnrespond nnto nnphishing nnattacks.


What nnare nnfour nnbroad nncategories nnof nnpayloads nnthat nnmalware nnmay nncarry? nn-
nnCORRECT✅✅corruption nnof nnsystem nnor nndata nnfiles;
theft nnof nnservice nnin nnorder nnto nnmake nnthe nnsystem nna nnzombie nnagent nnof nnattack
nnas nnpart nnof nna nnbotnet;
theft nnof nninformation nnfrom nnthe nnsystem, nnespecially nnof nnlogins, nnpasswords nnor
nnother nnpersonal nndetails nnby nnkeylogging nnor nnspyware nnprograms; nnand
stealthing nnwhere nnthe nnmalware nnhides nnit nnpresence nnon nnthe nnsystem nnfrom
nnattempts nnto nndetect nnand nnblock nnit.


What nnare nntypical nnphases nnof nnoperation nnof nna nnvirus nnor nnworm? nn-
nnCORRECT✅✅a nndormant nnphase nn(when nnthe nnvirus nnis nnidle),
a nnpropagation nnphase nn(where nnit nnmakes nncopies nnof nnitself nnelsewhere),
nna nntriggering nnphase nn(when nnactivated), nnand
an nnexecution nnphase nn(to nnperform nnsome nntarget nnfunction).

What nnmechanisms nncan nna nnvirus nnuse nnto nnconceal nnitself? nn-
nnCORRECT✅✅Some nnmechanisms nna nnvirus nncan nnuse nnto nnconceal nnitself
nninclude: nnencryption, nnstealth, nnpolymorphism, nnmetamorphism.


What nnis nna nn"drive-by-download" nnand nnhow nndoes nnit nndiffer nnfrom nna nnworm? nn-
nnCORRECT✅✅A nn"drive-by-download" nnexploits nnbrowser nnvulnerabilities nnso
nnthat nnwhen nnthe nnuser nnviews nna nnweb nnpage nncontrolled nnby nnthe nnattacker, nnit
nncontains nncode nnthat nnexploits nnsome nnbrowser nnbug nnto nndownload nnand nninstall
nnmalware nnon nnthe nnsystem nnwithout nnthe nnuser's nnknowledge nnor nnconsent. nnIt
nndiffers nnfrom nna nnworm nnsince nnit nndoes nnnot nnactively nnpropagate nnas nna nnworm
nndoes, nnbut nnrather nnwaits nnfor nnunsuspecting nnusers nnto nnvisit nnthe nnmalicious
nnweb nnpage nnin nnorder nnto nnspread nnto nntheir nnsystems.

, What nnis nna nn"logic nnbomb"? nn- nnCORRECT✅✅A nnlogic nnbomb nnis nncode
nnembedded nnin nnthe nnmalware nnthat nnis nnset nnto nn"explode" nnwhen nncertain
nnconditions nnare nnmet, nnsuch nnas nnthe nnpresence nnor nnabsence nnof nncertain nnfiles
nnor nndevices nnon nnthe nnsystem, nna nnparticular nnday nnof nnthe nnweek nnor nndate, nna
nnparticular nnversion nnor nnconfiguration nnof nnsome nnsoftware, nnor nna nnparticular nnuser
nnrunning nnthe nnapplication. nnWhen nntriggered, nnthe nnbomb nnexecutes nnsome
nnpayload nncarried nnby nnthe nnmalware.


What nnis nnthe nndifference nnbetween nna nnbackdoor, nna nnkeylogger, nnspyware, nnand
nna nnrootkit? nn- nnCORRECT✅✅A nnbackdoor nnis nna nnsecret nnentry nnpoint nninto nna
nnprogram nnor nnsystem nnthat nnallows nnsomeone nnwho nnis nnaware nnof nnthe nnbackdoor
nnto nngain nnaccess nnwithout nngoing nnthrough nnthe nnusual nnsecurity nnaccess
nnprocedures.
A nnbot nnsubverts nnthe nncomputational nnand nnnetwork nnresources nnof nnthe nninfected
nnsystem nnfor nnuse nnby nnthe nnattacker.
A nnkeylogger nncaptures nnkeystrokes nnon nnthe nninfected nnmachine, nnto nnallow nnan
nnattacker nnto nnmonitor nnsensitive nninformation nnincluding nnlogin nnand nnpassword
nncredentials.
Spyware nnsubverts nnthe nncompromised nnmachine nnto nnallow nnmonitoring nnof nna
nnwide nnrange nnof nnactivity nnon nnthe nnsystem, nnincluding nnmonitoring nnthe nnhistory
nnand nncontent nnof nnbrowsing nnactivity, nnredirecting nncertain nnweb nnpage nnrequests
nnto nnfake nnsites nncontrolled nnby nnthe nnattacker, nndynamically nnmodifying nndata
nnexchanged nnbetween nnthe nnbrowser nnand nncertain nnweb nnsites nnof nninterest;
nnwhich nncan nnresult nnin nnsignificant nncompromise nnof nnthe nnuser's nnpersonal
nninformation.
A nnrootkit nnis nna nnset nnof nnprograms nninstalled nnon nna nnsystem nnto nnmaintain nncovert
nnaccess nnto nnthat nnsystem nnwith nnadministrator nn(or nnroot) nnprivileges, nnwhilst
nnhiding nnevidence nnof nnits nnpresence nnto nnthe nngreatest nnextent nnpossible. nnThese
nncan nnall nnbe nnpresent nnin nnthe nnsame nnmalware.


What nnis nnthe nndifference nnbetween nna nn"phishing" nnattack nnand nna nn"spear-
phishing" nnattack, nnparticularly nnin nnterms nnof nnwho nnthe nntarget nnmay nnbe? nn-
nnCORRECT✅✅A nnphishing nnattack nnuses nna nnspam nne-mail nnto nnexploit nnsocial
nnengineering nnto nnleverage nnuser's nntrust nnby nnmasquerading nnas nncommunications
nnfrom nna nntrusted nnsource, nnthat nnmay nndirect nna nnuser nnto nna nnfake nnWeb nnsite,
nnor nnto nncomplete nnsome nnenclosed nnform nnand nnreturn nnin nnan nne-mail nnaccessible
nnto nnthe nnattacker. nnA nnmore nndangerous nnvariant nnof nnthis nnis nnthe nnspear-phishing
nnattack. nnThis nnagain nnis nnan nne-mail nnclaiming nnto nnbe nnfrom nna nntrusted nnsource.
nnHowever, nnthe nnrecipients nnare nncarefully nnresearched nnby nnthe nnattacker, nnand
nneach nne-mail nnis nncarefully nncrafted nnto nnsuit nnits nnrecipient nnspecifically, nnoften
nnquoting nna nnrange nnof nninformation nnto nnconvince nnthem nnof nnits nnauthenticity.
nnThis nngreatly nnincreases nnthe nnlikelihood nnof nnthe nnrecipient nnresponding nnas
nndesired nnby nnthe nnattacker.


Describe nnsome nnmalware nncountermeasure nnelements. nn-
nnCORRECT✅✅prevention nnin nnnot nnallowing nnmalware nnto nnget nninto nnthe
$7.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
eddigarreed

Conoce al vendedor

Seller avatar
eddigarreed Adams State College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
6 meses
Número de seguidores
0
Documentos
778
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes