Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Session 7 Describe each of the following terms. Viruses, worms, and Trojans. Wha

ID: 3736024 • Letter: S

Question

Session 7

Describe each of the following terms. Viruses, worms, and Trojans. What are some methods of circumventing them?

Answer:

Malware has become the second greatest external threat to most hosts, causing damage and requiring extensive recovery efforts within most organizations. (True/False)

Answer:

Advanced persistent threats (APTs) refers to the stealthy nature of malware. (True/False)

Answer:

When changes to the order of two or more events can cause a change in behavior this is considered a race condition. (True/False)

Answer:

Describe four examples of insecure file operations.

Answer:

Session 8

In Microsoft Windows, access control is a process that has three components. Please indicate and describe each.

Answer:

A virtual implementation of the application programming interface (API) that a running application expects to use is referred to as __________________.

Answer:

According to the course material what are the three reasons for deploying desktop virtualization?

Answer:

When addressing server security issues, it is an excellent idea to keep in mind general information security principles. According to the course material describe at least five of these principles.

Answer:

When users log in to a UNIX based system, their usernames are mapped to integers marking their _________________ and the __________________ that they are a member of.

Answer:

Explanation / Answer

As per the chegg Guideline, I am answering Q1.

Please repost others in separate post.

Q. Describe each of the following terms. Viruses, worms, and Trojans. What are some methods of circumventing them?


Viruses
The term computer virus is often used interchangeably with malware, though the two don't actually have the same meaning. In the strictest sense, a virus is a program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared. Most viruses attach themselves to executable files.

Worms:
Computer worms use the network to send copies of themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.

Trojans:
Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software.

What are some methods of circumventing them?
1: Install quality antivirus
2: Install real-time anti-spyware protection
3: Keep anti-malware applications current
4: Perform daily scans
5: Disable autorun
6: Don't click on email links or attachments
7: Use a hardware-based firewall
8: Deploy DNS protection

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote