Viruses rewrite themselves completely each time they are to infect newly executable , it can reprogram itself.
Question62:-What is Worm.
A self replicating program able to propagate itself across network.
is a slang word, closily linked with computer hacking.
Question64:-Ping of death
This attack modifies the IP portion of the Header.
Question65:-SYN Flood attack
This attack radomly opens up many TCP ports.
These attacks constitute program sucah as trojan horses or viruses that tie up CPU cycles, memory or other resources.
Sending a large number of spoofed ICMP echo or ping, regquest to broadcast address.
Question68:-Man in the Middle Attack
A hacker have access to network packetes that come across the network.
Vital information Resource under Siege
Question70:-________ is a program that can replicate itself and can make harmful to the other computer programs.
Question71:-What is difference between Virs and Worms
Work copies itself and run independently and travel across a network. A virus is dependent upon a host file or boot sector.
Consistently harass somebody over the internet.
a portable sotrage device succh as usb drives (thumbdrive) to illicitly download confidential data from a network endpoint.
Question74:-Thumbsucking is known as
A person who is engaged in online credit card fraud.
Question76:-The use of ipod etc. to download information illegally
Question77:- Use bluetooth devices to approach and stole information
A collection infected computer
Question80:-802.11 indicate ___________ net work