BTM 481 Lecture Notes - Script Kiddie, Denial-Of-Service Attack, Keystroke Logging

108 views5 pages

Document Summary

(cid:0)for complete protection when backing up your files, you should use a program that creates a_______ of your entire system. ------ image backup. A )_______ virus temporarily erases its code from the files where they reside an d then hides in the computer"s active memory. ------ stealth. A computer virus normally attaches itself to another computer program known as a. Assigning ip addresses when users log on to their isp is known as________. ------ dy namic addressing. The most likely method a hacker would use to access a computer is: ------ entering t hrough the internet. Devices that use a unique personal characteristic, such as a fingerprint, in pla ce of a password are called______ authentication devices. ------ biometric. A _______ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times. ------ logic bomb.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents