Question: ACROSS DOWN 3 Updates that will be downloaded and 1 An attacker who controls a botnet. installed automatically. 2 Enhancements to software to provide 8

 ACROSS DOWN 3 Updates that will be downloaded and 1 Anattacker who controls a botnet. installed automatically. 2 Enhancements to software to

ACROSS DOWN 3 Updates that will be downloaded and 1 An attacker who controls a botnet. installed automatically. 2 Enhancements to software to provide 8 Highest level user account. new or expanded functionality 10 Malicious computer code that 4 Database of viruses used to identify an reproduces itself. infected file. 12 Malicious program that uses a comptuer 5 Programs that deliver unwanted network to replicate. advertising content 18 Hardware/software designed to limit the 6 Type of virus infection that divides spread of malware. malicious code into several parts placed 19 The outcome or result of malware being at random positions. activated. 7 Type of account intended for temporary 20 Gives access to a program/service by users. circumventing normal security 9 Software that gathers user information protections. without consent. 23 Publicly released software security 11 When malware can trigger code update. execution on one computer from another 25 A copy of hard drive files stored in a via a network. secure location. 13 Cumulative package of all patches and 27 An computer under the remote control of feature updates. an attacker. 14 Code that lies dormant until triggered by 29 Software/hardware that captures and a specific event stores keystrokes. 15 Common type of data file viruses. 30 Wide variety of damaging software 16 Technique used by AV software to spot programs. virus characteristics rather than 31 A logical computer network of zombies matching a signature. under the control of an attacker. 17 A disguised program. 32 Software used to detect/remove viruses. 21 Windows function that obtains user 33 Malware's attempt at avoiding detection approproval before allowing a program is known as: to change computer settings. 22 Feature incorporated within a browser that stops advertisements from appearing 24 Malware that prevents normal use until a fee is paid. 26 Software used to detect/remove spyware. 28 Type of virus infection that attaches itself to the end of the infected file. CIS-135 - Introduction to Cybersecurity Chapter 3 Crossword Puzzle 12 19 25

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!