1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
14

A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac

ker to access the system at will with special privileges.
Computers and Technology
2 answers:
insens350 [35]3 years ago
6 0

Answer:

backdoor or trapdoor

Explanation:

A backdoor is also known as a trapdoor or manhole and is known to be a secret means of bypassing security in order to gain access to a system or a restricted part of a system. Some virus contains payload that installs a backdoor component in a system. This backdoor, thus grants the attacker special privilege access to the system at anytime.

MissTica3 years ago
4 0

Answer:

Back

Explanation:

Cyber attackers are individuals with networking and hacking skills needed to exploit vulnerabilities in networks to retrieve and steal information for mischievous reasons.

Malicious softwares or malwares are program softwares developed and planted to infiltrate system and network security. Examples of malwares are virus, worm, rootkit, Trojan horse, keylogger etc. They infect systems and networks to creat a back or trap door or loophole for attackers to access networks.

You might be interested in
This network passes data most of the time, but sometimes for reasons unknown to the junior network engineer in charge of monitor
Kaylis [27]

Answer:

The characteristic that is violated is Availability.

Explanation:

  • The network is passing data at mostly, it means performance is good. Junior network engineer is doing his job well then there is minimum chance of network failure or lack of manageability.
  • The scalability; range of computing capabilties can be managed by the engineer.
  • However, sometimes the core router might get crashed due to unavailability of the network that is not under the control of the engineer.

8 0
3 years ago
URGENTT 2 SIMPLE EASY QUESTIONS PLZZ HELP ION UNDERSTAND COMPUTERR ILL GIVE U BRAINLEST
nika2105 [10]

Answer:

I'll happy to help

Explanation:

Please make your clear. I couldn't understand!

8 0
2 years ago
Read 2 more answers
One goal of networking is to:
malfutka [58]
To further your employment opportunities
8 0
3 years ago
Read 2 more answers
It is always safe to enter personal information into a pop-up window. true or false.
Rufina [12.5K]
False ( it's never safe to enter personal information into a pop window cause hacker always around us)
4 0
3 years ago
When you are using the internet to research a school project, and you ignore the banner ads on websites even though you see them
FinnZ [79.3K]

Answer:

The answer is "selective exposure".

Explanation:

It is a theory in psychology, that is sometimes used in marketing and advertising studies. It traditionally applies to the propensity of people to prefer evidence, that enhances existing previous views while ignoring conflicting information.

These types of approaches are occurring, when the people pursue knowledge and consistently express desires for solutions, that are associated with their beliefs, rather than incompatible.

5 0
2 years ago
Other questions:
  • Choose all statements that identify the benefits of programming design.
    10·2 answers
  • ¿Cuál crees tú sea la finalidad de los virus informático, y porque son creados? ¿Cuáles son las precauciones y / o recomendacion
    13·1 answer
  • Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
    7·1 answer
  • "In about 100 words, describe the idea behind software as a service (SaaS). In your answer, include at least three examples of e
    10·1 answer
  • Please Help!
    6·2 answers
  • How much is a stock supra 1998​
    15·1 answer
  • g Which of the following factors primarily determines how the Internet is used in different countries? A. local attitude to info
    6·1 answer
  • Which command tells the for loop what to count by?
    9·2 answers
  • A CPU has just been powered on and it immediately executes a machine code instruction. What is the most likely type of instructi
    13·1 answer
  • One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!