Answer:
1. Classes and objects
2. Inheritance
3. Polymorphism
4. Data hiding/ encapsulation
5. Interfaces.
Explanation:
Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.
The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.
In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.
<u>Explanation:</u>
<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.
a. Cindy may learn the difference between these two techniques used to create a malware attack:
- through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
- through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.
b. Here are some common suggestions;
- Never open attachments from strange email addresses.
- install a paid antivirus software.
- be mindful of websites with too many ads.
Explanation:
the right answer may be A.
Answer:
C. Address Resolution Protocol (ARP) poisoning.
Explanation:
An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.
A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.
When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.