Chapter 3 worksheet.docx - Chapter3: Code& Totalpoints13\/13 Worksheet Name RileyMolter desiredoperation 1\/1 TrojanHorse Rootkit Ransomware LogicBomb

Chapter 3 worksheet.docx - Chapter3: Code&...

This preview shows page 1 - 3 out of 5 pages.

Chapter 3: Identify Types of Malicious  Code & Email and Browser Attacks Total points 13/13   Worksheet.  Name:  * Riley Molter   Malware that carries out malicious operations under the disguise of a  desired operation  * 1/1 Trojan Horse   Rootkit Ransomware Logic Bomb Virus Worm   Malicious program that uses a trigger to awaken the malicious code.  * 1/1 Trojan Horse Rootkit Ransomware Logic Bomb   Virus Worm   Malicious executable code that is attached to another executable file,  such as a legitimate program  * 1/1 Trojan Horse
Rootkit Ransomware Logic Bomb Virus   Worm   Malicious code that is used to compromise a system using  backdoors  * 1/1 Trojan Horse Rootkit   Ransomware Logic Bomb Virus Worm   Malicious code that holds a computer system, or the data it contains,  captive until the target makes a payment  * 1/1 Trojan Horse Rootkit Ransomware   Logic Bomb Virus Worm  

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture