Computers

Image

Sec+ Terms Domain 3 1/2

1
play

15 questions

Show Answers
See Preview
  • 1. Multiple Choice
    1 minute
    1 pt
    _ has the ability to morph or mutate when it replicates itself, or when it executes making it difficult for antivirus software to track/find.
    Amphibious Virus
    Logic Malware
    Armored Virus
    Polymorphic Malware 
  • 2. Multiple Choice
    1 minute
    1 pt
    Which of the following is a group of programs (or, in rare instances, a single program) that hides the fact that the system has been infected or compromised by malicious code and has system-level access.
    Faux-Admin Viruses
    Rootkits
    BIOS Worms
    Botnets
  • 3. Multiple Choice
    1 minute
    1 pt
    An attack in the form of active interception or active eavesdropping where the attacker inserts themselves in the middle of two systems that are communicating.
    Center-Seat
    Man-in-the-Middle
    Phising
    SQL Injection
  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?