Match each item with a statement below.

A. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
B. An attacker who controls a botnet
C. A logical computer network of zombies under the control of an attacker
D. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability
E. Hardware or software designed to limit the spread of malware
F. Computer code that lies dormant until it is triggered by a specific logical event
G. A database of viruses that is used to identify an infected file
H. A malicious program designed to enter a computer via a network
I. An infected computer that is under the remote control of an attacker

A. adware
B. bot herder
C. botnet
D. feature update
E. firewall
F. logic bomb
G. signature file
H. worm
I. zombie

Computer Science & Information Technology

You might also like to view...

The ________ of a workbook displays the file name as well as the software name

Fill in the blank(s) with correct word

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Polymorphism allows the addition of classes providing they were at least considered during program development. 2. When a request is made to use a derived-class-object method through a base-class reference, Visual Basic polymorphically chooses the correct overridden method in the derived class that is associated with the object. 3. Polymorphism allows you to command a wide variety of objects of types related by inheritance as long as you know the objects’ types. 4. The use of polymorphism helps promote software extensibility. 5. Abstract methods and properties do not provide an implementation.

Computer Science & Information Technology