1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
14

A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac

ker to access the system at will with special privileges.
Computers and Technology
2 answers:
insens350 [35]3 years ago
6 0

Answer:

backdoor or trapdoor

Explanation:

A backdoor is also known as a trapdoor or manhole and is known to be a secret means of bypassing security in order to gain access to a system or a restricted part of a system. Some virus contains payload that installs a backdoor component in a system. This backdoor, thus grants the attacker special privilege access to the system at anytime.

MissTica2 years ago
4 0

Answer:

Back

Explanation:

Cyber attackers are individuals with networking and hacking skills needed to exploit vulnerabilities in networks to retrieve and steal information for mischievous reasons.

Malicious softwares or malwares are program softwares developed and planted to infiltrate system and network security. Examples of malwares are virus, worm, rootkit, Trojan horse, keylogger etc. They infect systems and networks to creat a back or trap door or loophole for attackers to access networks.

You might be interested in
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
2 years ago
"running computer programs and their data are stored in ___"
Lesechka [4]

Solution:

Running computer programs and their data are stored in Rom.

ROM is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. Unlike a computer's random access memory (RAM), the data in ROM is not lost when the computer power is turned off. The ROM is sustained by a small long-life battery in your computer.

5 0
3 years ago
Read 2 more answers
Which of the following software is cloud-based? OpenOffice Writer Word 2013 Word Online Word Perfect\
evablogger [386]
I think its open office
3 0
3 years ago
Read 2 more answers
Enables you to navigate through pieces of information by using links which connect them.
anyanavicka [17]
I believe your answer would be Hypertext. 

Hypertext is a t<span>ext that contains links to other text and 'enables you to navigate through pieces of info by using the links that connect them'; it is also used to navigate the World Wide by using hyperlinks.

Hope I helped :)</span>
3 0
3 years ago
1.an electronic index of books A. web page
zimovet [89]
It was quite difficult to understand what you need. Anyway, I've got it. I guess you need to much all the terms to each sentence. So I think I've done it right. Check it out:

1.an electronic index of books - <span>B. computer catalog
</span><span>
2.a device which categorizes and locates web sites - </span><span>H. search engine
</span><span>
3.to draw a conclusion - </span>D. infer<span> 

4.a block of information stored in an HTML file on a server - </span><span>A. web page
</span><span>
5.the table of contents of a web site - </span><span>G. home page
</span><span>
6.a software package which retrieves information from any or all available Internet servers - </span><span>I. browser
</span><span>
7.a highlighted word or phrase within a web page which acts as a "bridge" to another web page or site - </span><span>F. hyperlink
</span><span>
8.a topic sentence - </span><span>C. key sentence
</span><span>
9.a term which aids in narrowing a web search - </span>E. keyword
5 0
3 years ago
Other questions:
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • A researcher develops a new instrument to measure coping skills and conducts a pilot study to compare the new tool with an exist
    5·1 answer
  • What are the main types of reading tools? Check all that apply. please HELP​
    15·1 answer
  • 8.13 LAB: Elements in a range Write a program that first gets a list of integers from input. That list is followed by two more i
    8·1 answer
  • A network technician is designing a network for a small company. The network technician needs to implement an email server and w
    7·1 answer
  • I prefer a job where I am praise for good performance or I am accountable for results
    13·1 answer
  • please help no one is helping me on this one
    9·1 answer
  • I'm trying to move the figure a little away from, the column line and every time I move it and click ok it goes back to being be
    11·1 answer
  • What are the two compatibility issues that may arise between computer systems while transferring presentations? different video
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!