Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Virus Worm Logic bomb Trojan Horse Kit (Virus generator) Flooders Rootkit Zombie

ID: 3718138 • Letter: V

Question

Virus

Worm

Logic bomb

Trojan Horse

Kit (Virus generator)

Flooders

Rootkit

Zombie (bot)

Adware

Spyware

used to attack networked computer systems with a large volume of traffic to carry out a denial-of-service (DoS) attack. 2. A ; is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network 3.As a software that collects int is a software that collects information from a computer and transmits it to another system 4. A #1 is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms 5. A is a malware that, when executed, tries to replicate itself into other executable code; when it succeeds the code is said to be infected. 6. A is a set of tools for generating new viruses automatically 7. A is an advertising that is integrated into software. It can result in pop-up ads or redirection of a browser to a commercial site 33.. A is a program inserted into software by an intruder. It lies dormant until a predefined condition is met; the program then triggers an unauthorized act 9. A ;I is a program activated on an infected machine that is activated to launch attacks on other machines. 10. A ;is a set of hacker tools used after attacker has broken into a computer system and gained root-level access.

Explanation / Answer

Answers of the Given Questions are:

1. flooder

2. worm

3. Spyware

4. Trojan Horse

5. virus

6. Kit

7. adware

8. Logic Bomb

9. Zombie (Bot)

10. Rootkit

____________________________________________________________________________________________

Explanation:

Flooders:
Flooders are basically the programs which flow a large amount of data on a server which eventually jams the server such that no incoming request can be done.

Virus:
Viruses are the programs that infects the code of a program and consequently crashes the system.

Worm:

The worm is a program that replicates itself in the computer and spread itself and slows down the performance of the computer by increasing the load and utilizing memory.

Spyware:
Spyware is a software program that installs on the prey and extracts information from the prey hard drive unknowingly. It is commonly used to retrieve bank credentials.

Trojan Horse:

Trojan Horse is a software program which acts normally until it passes all the security protocols in the system and after passing into the computer. It starts acting like a virus. It is actually a Virus.


Kit:
A kit is a set of software tools used to generate viruses automatically.

Adware:
Adware is a software program which shows pop and adds in the system by installing it automatically when some other software is being installed.

Logic Bomb:
Logic Bomb
is a virus which affects the computer in a harmful way Only IF THE CERTAIN CONDITION IS MET.

Zombie:

Zombie can be known as a computer which a hacker has control and can be used to harm other computers as well.

Rootkit:
Rootkit is a software tool which is used to access other computers.