COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Root access
|
|
Administrative access
|
|
Zero-day vulnerability
|
|
Backdoor
|
Detailed explanation-1: -Backdoor is an undocumented way of gaining access to a program, online service, or an entire computer system.
Detailed explanation-2: -A backdoor is a potential security risk. An undocumented way of gaining access to a computer system. A backdoor is a potential security risk. A malicious program that listens for commands on a certain Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port.
Detailed explanation-3: -Rootkit: A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
Detailed explanation-4: -Which of the terms listed below refers to an example of a crypto-malware? A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse.
Detailed explanation-5: -Botnets: Collections of compromised systems commonly used in DDoS attacks.