IT Security_ Defense against the digital dark arts. Week1_ Understanding Security Threats 5. Which statement is true for both a worm and a virus?: they're self-replicating and self-propagating; Both worms and viruses are capable of spreading them- selves using a variety of transmission means. 6. Check all examples of types of malware:: worms adware viruses; These three are all examples of unwanted software that can cause adverse affects to an infected system, which is exactly what malware is 7. What are the characteristics of a rootkit? Check all that apply.: Is difficult to detect; A rootkit is designed to provide administrator-level access to a third party without the system owner's knowledge. Given this, rootkits are usually designed to avoid detection and can be difficult to detect. provides elevated credentials; A rootkit is designed to provide administrator-level access to a third party without the system owner's knowledge. Given this, rootkits are usually designed to avoid detection and can be difficult to detect. 8. What are the dangers of a man-in-the-middle attack? Check all that apply.- : an attacker can modify traffic in transit

Contact the Author

Please Sign In to contact this author.