Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

MIST 356 EXAM SCRIPT UPDATED QUESTIONS AND ANSWERS GRADED A.pdf

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
05-01-2026
Geschreven in
2025/2026

MIST 356 EXAM SCRIPT UPDATED QUESTIONS AND ANSWERS GRADED A.pdf

Instelling
Mist
Vak
Mist

Voorbeeld van de inhoud

MIST 356 EXAM SCRIPT UPDATED QUESTIONS AND
ANSWERS GRADED A+
✔✔Viruses - ✔✔a code that runs on a computer typically without the user's knowledge;
Disguised as legitimate programs; Can be embedded within legitimate software; Usually
requires user input.

✔✔Boot Sector Virus - ✔✔Loads into the first sector of the hard drive, when the
computer boots, the virus is loaded into memory and gets executed

✔✔Macro Virus - ✔✔usually embedded or bundled in documents requiring the user to
execute

✔✔Program-based Virus - ✔✔usually embedded within a program

✔✔Encrypted Virus - ✔✔uses self-encryption to hide detection by ant-virus software

✔✔Polymorphic Virus - ✔✔a virus that changes or updates its code to avoid detection
by any-viruses

✔✔Metamorphic Virus - ✔✔Polymorphic on steroids. A virus completely changes itself
regularly as it infects new files. These are very difficult to write.

✔✔Armored Virus - ✔✔Makes false obvious copies of itself to trick anti-viruses to go
after the copies instead of the original virus

✔✔Worms - ✔✔similar to a virus, except it self-replicates, meaning, once the worm is
executed it can spread from system to system across the network without any user
input; Very dangerous and takes advantage of network security vulnerabilities.

✔✔Ransomware - ✔✔software that restricts access to a computer system or data until
a pre-defined "ransom" is paid to the attacker. Typically done to gain money

✔✔Trojans (Trojan Horse) - ✔✔malicious programs that disguise themselves as
legitimate programs but are actually doing bad stuff behind the scenes. They are not
viruses, but operate in a similar manner.

✔✔Trojan Downloader - ✔✔downloads malicious programs onto a computer without the
user's knowledge or input

✔✔Spyware - ✔✔a type of malicious software that is usually installed alongside of third-
party software. Usually runs silently in the background, unnoticed by the user. Collects
information, ranging from websites you like to access to recording your keystrokes

, ✔✔Rootkits - ✔✔a program that is designed to gain administrative or "root" privileges
over a system without being detected. Rootkits are typically very small, and are often
undetected by many anti-virus or anti-malware software

✔✔Spamware - ✔✔software that hipjacks your email client or your email address itself
to further propagate spam messages

✔✔RATs (Remote Access Trojans) - ✔✔elevates privileges to allow an attacker to gain
administrative or elevated control of a system

✔✔DDOS Trojan - ✔✔tries to overload a computer's processor by placing requests or
commands at a high frequency

✔✔Malware Delivery Methods - ✔✔- Via software, messaging, and media
- Botnets and zombies
- Active interception
- Privilege escalation
- Backdoors
- Logic Bombs

✔✔Botnets - ✔✔are groups of compromised computers that have been taken over by a
master computer that sends out malicious software to unsuspecting individuals.
Computers taken over by botnets are called 'Zombies'.

✔✔Privilege Escalation - ✔✔exploiting a bug or flaw in the operating system or system
firmware to gain access over resources

✔✔Logic Bomb - ✔✔code that has been either injected or pre-placed into software that
is meant to incur a malicious event

✔✔OS Firewalls - ✔✔a good first line of defense. Not perfect. Network firewalls are very
important too.

✔✔Data Segregation - ✔✔most systems have the operating systems installed to a
single drive. If data is important, try to segment to a different driver, either a physical
local drive or network drive

✔✔HIDS - ✔✔loaded on an individual computer. Analyses and monitors what happens
inside that computer

✔✔NIDS - ✔✔can be loaded on individual computers, or it can be loaded on network
appliances. Or it can be a physical stand-alone network device itself

✔✔In-Line - ✔✔all network traffic flows through the NIDS

Geschreven voor

Instelling
Mist
Vak
Mist

Documentinformatie

Geüpload op
5 januari 2026
Aantal pagina's
9
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
BOARDWALK Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
241
Lid sinds
1 jaar
Aantal volgers
7
Documenten
28007
Laatst verkocht
5 uur geleden
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.5

36 beoordelingen

5
14
4
6
3
8
2
1
1
7

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen