Macro virus - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Macro virus? On this page you'll find 230 study documents about Macro virus.
Page 3 out of 230 results
Sort by
-
Ethics In Technology DSST fully solved graded A+ 2023
- Exam (elaborations) • 22 pages • 2023
- Available in package deal
-
- $17.99
- + learn more
Ethics In Technology DSST 
Boot Sector Virus - correct answer An infectious program that can replace the boot program with a modified, infected version, often causing boot and data retrieval problems. 
 
The boot sector virus is so named because it can overtake your computer when it is booting up. 
 
Trojan Horse or Program Virus - correct answer a coded program which masks the existence of a virus or malware by making its appearance look normal while containing malicious utilities transparent t...
-
ITN 260 EXAM QUESTIONS WITH ALL CORRECT ANSWERS
- Exam (elaborations) • 6 pages • 2024
- Available in package deal
-
- $12.59
- + learn more
ITN 260 EXAM QUESTIONS WITH ALL CORRECT ANSWERS 
 
Which of the following is malicious computer code that reproduces itself on the same computer? - Answer- virus 
 
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware? - Answer- Adware 
 
Which of the following is not one of the four methods for classifying the various types of malware - Answer- Source 
 
A virus that infects an executable progra...
-
Network Security Quiz 7 Malware Exam 30 Questions with Verified Answers,100% CORRECT
- Exam (elaborations) • 4 pages • 2024
-
- $10.49
- + learn more
Network Security Quiz 7 Malware Exam 30 Questions with Verified Answers 
 
Malicious software aims to trick users into revealing sensitive personal data. - CORRECT ANSWER True 
 
Keyware captures keystrokes on a compromised system. - CORRECT ANSWER False 
 
Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. - CORRECT ANSWER False 
 
A virus that attaches to an executable program can do anything that the prog...
-
Microbiology Midterm Exam Correctly Answered.
- Exam (elaborations) • 26 pages • 2024
- Available in package deal
-
- $10.99
- + learn more
Microbiology Midterm Exam Correctly Answered. 
 
 
Define Micro- - CORRECT ANSWER Less than 1mm and cannot see with the naked eye 
Need a microscope to see 
Microbes, microorganisms, germs, bugs 
 
What are the 5 groups of microorganisms studied? - CORRECT ANSWER Bacteria--most famous 
Virus--2nd 
Fungus--3rd 
Protozoa--some but few 
Algae--not a human pathogen 
 
What generates 1/2 of the O2 that we breathe and would make life impossible without? - CORRECT ANSWER Microbes 
 
What is the smalles...
-
Computer Security Chapter 6 Exam 15 Questions with Verified Answers,100% CORRECT
- Exam (elaborations) • 3 pages • 2024
-
- $9.79
- + learn more
Computer Security Chapter 6 Exam 15 Questions with Verified Answers 
 
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________. 
A. Adobe 
B. Animoto 
C. Malware 
D. Prezi - CORRECT ANSWER C. Malware 
 
__________ are used to send large volumes of unwanted e-mail. 
A. Rootkits 
B. Spammer programs 
C. Downloaders 
D. Auto-rooters - CORRECT ANSWER B. Spammer programs 
 
A __________ is code inserted in...
As you read this, a fellow student has made another $4.70
-
WGU C843 Managing Information Security Final Exam Questions and Answers Updated 2024/2025 (GRADED A+)
- Exam (elaborations) • 36 pages • 2024
-
- $16.49
- + learn more
WGU C843 Managing Information Security Final Exam Questions and Answers Updated 2024/2025 (GRADED A+) A(n) polymorphic threat is one that over time changes the way it appears to antivirus 
software programs, making it undetectable by techniques that look for pre-configured 
signatures. 
A 
False 
B 
True - ANSWER B 
Question 4 :Which type of attack involves sending a large number of connection or 
information requests to a target? 
A 
denial-of-service (DoS) 
B 
brute force 
C 
spear fishing 
D ...
-
Nightingale Sci 225 || All Questions Answered Correctly.
- Exam (elaborations) • 11 pages • 2024
- Available in package deal
-
- $10.79
- + learn more
Pathogenisis correct answers The matter of development of a disease 
 
sequel correct answers pathological condition resulting from a prior disease, injury, or attack 
 
etiology correct answers the science and study of the causes or origins of disease 
 
idiopathic correct answers any disease that is of uncertain or unknown origin may be termed 
 
congenital correct answers a condition that is presented at birth, whether or not it is inherited 
 
Metabolic Degenerative correct answers can happe...
-
WGU C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+
- Exam (elaborations) • 36 pages • 2024
-
- $16.49
- + learn more
WGU C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+. Which of the following is the first step in the problem-solving process? 
A 
Analyze and compare the possible solutions 
B 
Develop possible solutions 
C 
Recognize and define the problem 
D 
Select, implement and evaluate a solution - ANSWER C 
A(n) polymorphic threat is one that over time changes the way it appears to antivirus 
software programs, making it undetectable by techniques that loo...
-
Computer Concepts Final Exam study guide, With Computer solution 2024.
- Exam (elaborations) • 9 pages • 2024
- Available in package deal
-
- $7.99
- + learn more
Computer Concepts Final Exam study guide, With Computer solution 2024. 
 
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. 
Rootkit 
A ________ allows visitors to add, remove, or edit its content. 
Wiki 
A ________ check compares the values of data in two or more fields to see whether those values are reasonable. 
consistency 
A ________ check would be used to restrict the fines for speeding violations from $50 to $250. 
r...
-
Ethical Hacking Exam 1 (1-5) Practice Questions and 100% Correct Answers
- Exam (elaborations) • 11 pages • 2024
-
- $8.99
- + learn more
What is the main purpose of malware? Financial gain or destruction 
A computer _________ relies on a host to propagate throughout a network. Virus 
An exploit that attacks computer systems by inserting executable code in areas of memory because of poorly written code is called which of the following? Buffer overflow 
Which of the following exploits might hide jit's destructive payload in a legitimate application or game? Trojan program 
Antivirus software should be updated annually. True or Fal...
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia