Question

Principals of Computer Security A piece of malicious code that sits dormant for a period of...

Principals of Computer Security

A piece of malicious code that sits dormant for a period of time until some event is called a _____________.

a.

trojan

b.

logic bomb

c.

spyware

d.

rootkit

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Logic Bomb

Add a comment
Know the answer?
Add Answer to:
Principals of Computer Security A piece of malicious code that sits dormant for a period of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Principals of Computer Security Small bits of text that are stored on a user's machine and...

    Principals of Computer Security Small bits of text that are stored on a user's machine and sent to specific websites when the user visits are called: a. temp files b. documents c. web history d. cookies

  • 1. a. Upon a risk analysis on a company's site network, some threats are identified. These include threats from malicious code (i.e. virus, worms and Trojan horse) and threats from denial of...

    1. a. Upon a risk analysis on a company's site network, some threats are identified. These include threats from malicious code (i.e. virus, worms and Trojan horse) and threats from denial of service (DoS) attacks. To address these threats, an administrator in the company, Bob, has suggested using a firewall to control the access of the site network from the Internet. i. Contrast the three types of malicious code, virus, worms and Trojan horse. ii. There are three types of...

  • 6. The Computer Security Institute (CSI) conducts an annual survey of computer crime at U.S. busi...

    6. The Computer Security Institute (CSI) conducts an annual survey of computer crime at U.S. businesses. CSI sends survey questionnaires to computer security personnel at all U.S. corporations and government agencies. The 2010 CSI survey was sent and 351 organizations responded. One of the survey questions asked respondents to indicate the percentage of monetary losses attributable to malicious actions by individuals within the organization (i.e., malicious insider actions). The following table summarizes the data for the 144 firms who experienced...

  • A security administrator is analyzing a user report in which the computer exhibits odd network-related outages....

    A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrator, however, does not see any suspicious processes running. A prior technician's note indicate the machine has been remediated twice, but the system still exhibits odd behavior. Files were deleted from the system recently. Which of the following is the most likely cause of this behavior? A. Crypto-malware B. Rootbit C. Logic bomb D. Session hijacking

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Computer Security Help 21) The process of keeping a backup copy of each file being worked...

    Computer Security Help 21) The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________. A) file backup B) file/folder backup C) image backup D) shadowing 22) Attacks other than application level attacks usually fail to get through SPI firewalls. True False Save 23) Normally, there is no limit on how long shadowing may maintain backed up files. True False 24) Java applets are large Java programs. Question...

  • Write the code in C language. Computer communication networks sometimes have noise on them, which can...

    Write the code in C language. Computer communication networks sometimes have noise on them, which can corrupt data being transmitted. It is the responsibility of the computers communicating to confirm data is transmitted accurately. One method to do this is to calculate a checksum of the data and transmit the checksum along with the data to ensure accuracy. In C, we can compute a checksum simply by summing the integer ASCII codes in the message and finding the remainder of...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT