3) Actually virus in its lyfe cycle goes through 4 different stages which are Dormant,propagating,triggering and excution phase and are performed in same order respectively
In propagating phase, the virus replicate itself in another program on the disk so that it can effect the whole.
In exccution phase, the virus actually perform its function and destroy file on the disk, crashes system etc. these can only be done if the virus was present in the whole disk which inturn can only be possible if virus replicate itself earlier before execution. so propagation phase happen before execution phase.
4)Virus can enter in computer by i) downloading infected file from network(website)
ii)Visiting infected website and performing action like clicking on advertisement.
iii)uploading file in computer from USB/floppy
iv)through email attachment(when user perform some action on infected email)
Worm can enter in computer by i)warm can enter computer from software that are at risk from being exposed
ii) it can enter in spam email
iii) It can also enter from malicious website when we open it.
4)Password in browser are mainly stored in plain text(non encrypted form) mean human readable form and are not a secured way to save password where as password stored in website can be in many form like (i)plaintext(non encrypted form),(ii) encrypted form(uses key to change our password in randome text), (iii) Hashed password(somewhat similar to encryption as it turn our password into random text) but not completely similar to encryption as hashing is one way side.mean we can not run algo in backward direction. there are other mode of encryption methos for website also. So, it is advisable that we should not our password in browser.
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE...
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC IS "MALICIOUS SOFTWARE" - Q26 what are the phases of a Vous? huuchat are the phases of a a lifecycle of a virus? 6 what is the darmant phase, what is a trigger phase, as the .. logic Bomb what is the propagation Phase, what is the execution phase.
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC "MALICIOUS SOFTWARE" ch=6 it a softwar part / maluarepart. 1 what is the Difference between the T virus & a warm.. Ang Virus - A urus need a host Software latch on to. wearm Awarm is a stand alone, a cuorm can do damage without latdlung any host software. e to on to
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC "DENIAL OF SERVICE ATTACKS" À chat Denial of surface menu 2) What is Denial of Service es =) wheet us Destrubutine Denial of seruisce. Q2 Describe the Tcp sin cetrack, 23 Describe the UDP fludding attach. Qy Describe the DNS Carruption attack. clore How. Do you reduce the St. Risk of A TEP Sin attack. Os How Do you menimize...
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC IS "DATABASE AND DATA CENTER SECURITY" Do what Daes Dms Stands for give some Examples - Qy which Daes DDL Stands far, Examples?
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC IS "DATABASE AND DATA CENTER SECURITY" In Database and Data Center Security. What is Piggybacking attack? A) Give real life example? B) Give one SQL code example of Piggybacking attack? C) How do you minimize the chances of this attack? Le Q4 Then there isa Piggyback attack a 4 Select the record of the studen whase, name is Robert close...