focusNode Show
Didn't know it? Knew it? Embed Code - If you would like this activity on your web page, copy the script below and paste it into
your web page. Chapter 15
What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?It may also be inserted into other forms of malware such as viruses, worms or Trojan horses. A logic bomb is sneaky because its code lies dormant until the trigger occurs.
Which term refers to a type of an attack where an attacker spoofs addresses and inserts their packets in the middle of an existing connection?ARP spoofing attack: The attacker sends spoofed ARP packets across the Layer 2 network in order to link the attacker's MAC address with the IP address of a legitimate host.
Is software that lays dormant until some specific condition is met?A logic bomb is software that lays dormant until some specific condition is met. That condition is usually a date and time.
What is it called when a person registers a domain name relinquishes it in less than five days and then gets the same name again repeating this cycle over and over again?indirect attack. A person registers a domain name, relinquishes it in less than five days, and then gets the same name again.
|