Question

QUESTION 8 What is the name of a software program that responds to commands sent by...

QUESTION 8

  1. What is the name of a software program that responds to commands sent by a command-and-control program located on an external computer?

    A.

    bot

    B.

    spoof

    C.

    vampire

    D.

    virus

    E.

    worm

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 8-

A). bot

Explanation:-

  • The main function of the command and control program is to give directions to the devices that are infected with malware and the bot responds to this program.
  • These bots, when used in a malicious way, becomes self-propagating malware and infect the host and connect back to the command and control program.
  • On the other hand, the virus spread by creating copies of itself and becoming part of some other program.
  • Worms are very much similar to a virus but they do not require a host to propagate.
  • Spoofing is a technique where a person or program hides its real identity to do an unauthorized task.
  • Hence the option A is most suitable among all.
Add a comment
Know the answer?
Add Answer to:
QUESTION 8 What is the name of a software program that responds to commands sent by...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • D Question 18 2.5 pts The FBI's National Crime Information Center database O has information about...

    D Question 18 2.5 pts The FBI's National Crime Information Center database O has information about every American citizen. O has never led to a false arrest. contains more than 39 million records. O All of the above O is updated only once a week to give the FBI time to check the accuracy of the data. 2.5 Question 19 PC a X Question 19 2.5 pts A software program that responds to commands sent by a command-and-control program located...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • Unix questions, i need help on Hint: Commands to study to answer this question: predefined shell...

    Unix questions, i need help on Hint: Commands to study to answer this question: predefined shell variables, and .profile script file, echo SHELL, HOME, PATH, MAIL and TERM are predefined shell variables. You can use the value of a shell variable in a shell command putting $ in front of it. For example, to display the value of the HOME directory of the user, specify $HOME in the echo command like echo $HOME. Do not give just the value of...

  • 18. What kind of software products can you download from the Internet without being subjected to...

    18. What kind of software products can you download from the Internet without being subjected to copyright restrictions? A. Public domain software B. Freeware C. Open source software D. Shareware 19. What type of program would have a class named Student with objects called fullTime and partTime? A. machine language program B. object-oriented program C. markup language program D. procedural language program 20. What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?...

  • A mechanical turtle walks around a room under the control of a C++ program. Note: There...

    A mechanical turtle walks around a room under the control of a C++ program. Note: There is no animation of the turtle walking around the room The turtle holds a pen in one of two positions, up or down. When the pen is down the turtle draws out the shape as it moves. When the pen is up, the turtle moves about freely without writing anything. For this assignment you will write a program to simulate the operation of the...

  • QUESTION 1 What will be the output of following Unix command: find / -name ‘*’ A....

    QUESTION 1 What will be the output of following Unix command: find / -name ‘*’ A. List all files and directories recursively starting from / B. List a file names * in / C. List all files in / directory D. List all files and directories in / directory QUESTION 2 Which command is used to extract a column/field from a text file / input. A. paste B. get C. cut D. tar QUESTION 3 Which command creates an empty...

  • Which of the following commands displays the string ‘Enter a value for D ‘ and then...

    Which of the following commands displays the string ‘Enter a value for D ‘ and then waits for the user to enter a number and then assigns that number to the variable D? A. D=enter(‘Enter a value for D ‘) B. input(D=,‘Enter a value for D ‘) C. D=input(‘Enter a value for D ‘) D. enter(D=,‘Enter a value for D ‘) E. None of the above What is MATLAB’s response to the following command: a=(4*2==16/2)+3 A. a=0 B. a=1 C....

  • Question #4 (10 marks) Scenario: Company B is a software company that employs many computer programmers....

    Question #4 (10 marks) Scenario: Company B is a software company that employs many computer programmers. The company uses accounting software that was created by one of the employees. In order to be more flexible and share the workload, all of the programmers have access to the accounting software program in case changes are needed. 1. Based on the scenario, identify the weakness. 2. What could go wrong? 3. Provide a recommendation to address/remove the control weakness

  • Question #4 (10 marks) Scenario: Company B is a software company that employs many computer programmers....

    Question #4 (10 marks) Scenario: Company B is a software company that employs many computer programmers. The company uses accounting software that was created by one of the employees. In order to be more flexible and share the workload, all of the programmers have access to the accounting software program in case changes are needed. 1. Based on the scenario, identify the weakness. 2. What could go wrong? 3. Provide a recommendation to address/remove the control weakness Student's response to...

  • QUESTION 1 From YOUR home directory, execute a find command string that will locate the file...

    QUESTION 1 From YOUR home directory, execute a find command string that will locate the file called resolv.conf. Include the -exec flag in the find command to cat the file to the screen. Begin your find search from the letc directory Select the correct find command string below that will accomplish this. find /etc-name 'resolv.conf -cat D find /etc-name 'resolv.conf -exec cat 0 find. -name 'resolv.conf -exec cat 0\ find /-name 'resolv.conf' -exec cat 0 QUESTION 2 What find command...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT