BTM 481 Lecture Notes - Denial-Of-Service Attack, File Transfer Protocol, Keystroke Logging
Document Summary
For complete protection when backing up your files, you should use a program tha t creates a_______ of your entire system. ------ image backup. A )_______ virus temporarily erases its code from the files where they reside an d then hides in the computer"s active memory. ------ stealth. A computer virus normally attaches itself to another computer program known as a. Assigning ip addresses when users log on to their isp is known as________. ------ dy namic addressing. The most likely method a hacker would use to access a computer is: ------ entering t hrough the internet. Devices that use a unique personal characteristic, such as a fingerprint, in pla ce of a password are called______ authentication devices. ------ biometric. A _______ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times. ------ logic bomb.