1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
13

Instructions:Emotet is an advanced banking Trojan that primarily functions as a downloader of other Trojans. According to the Sy

mantec Internet security threat report, Emotet first emerged in 2014 and, after a quiet period, reappeared to make waves in the second half of 2017. Emotet again made headline news when it was used in more attacks in late 2019. In this activity, you will do some research and answer the following questions about Emotet.Note:Include references to support each of your answers, such as the book, news article, or website you collected the information from. Only answers with references will receive points.1. [10 points] Explain how the malware spread itself. In particular, do you think its spreading mechanism is like a worm or a virus? Justify your answer. (4-6 sentences)2. [10 points ] Explain the concealment mechanisms employed by Emotet. (3-6 sentences)3. [10 points ] Explain how Emotet communicates with a command and control (C&C) server? (4-6 sentences)
Computers and Technology
2 answers:
Nastasia [14]3 years ago
3 0
I do not understand what you’re question is
Pachacha [2.7K]3 years ago
3 0
I don’t understand your question could you explain it better ?
You might be interested in
Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
klio [65]

Explanation:

Respuesta al incidente

5 0
3 years ago
What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
cluponka [151]

A world  have 2^128 (340 undecillion) of IPv addresses that helps to connect to the internet. IPv6 addresses can make it easier for working organizational teams connecting to the Internet, IP addresses that are created by IPv6 are 128 bits.

<h3>What is internet?</h3>

Internet is the system  uses the Internet protocol suite (TCP/IP)  and interconnected computer networks that communicate between two or more individuals.

Today, almost 20 IP addresses are taken by7 each home for each electronic device. The internet usage is so wide, that even a simple task  is not possible without it. Even a simple task can be done using internet.

Learn more about internet.

brainly.com/question/13308791

#SPJ1

5 0
2 years ago
Determine the number of bytes necessary to store an uncompressed RGB color image of size 640 × 480 pixels using 8, 10, 12 and 14
dexar [7]

Answer:

For 8 bits / Color Channel: 921, 600 bytes.

For 10 bits / Color Channel: 1,152,000 bytes.

For 12 bits / Color Channel: 1,382,400 bytes.

For 14 bits / Color Channel : 1,612, 800 bytes.

Explanation:

Un uncompressed RGB color image of 640 pixels wide by 480 pixels height (VGA resolution) uses 3 samples of x bits fin order to represent the quantity of each primary color (red, green and blue) in a given pixel of the image.

So, if we use 8 bits/ sample, we can calculate the bytes needed to store a complete image as follows:

640*480*3*8 bits = 7, 372,800 bits. (1)

As, by definition, 1 byte= 8 bits, we have:

Nº of bytes = 7,372,800 / 8 = 921,600 bytes. (2)

In order to get the bytes needed to store the same image, using 10, 12 and 14 bits/ sample, all we need is replacing 8 by 10, 12 and 14 in (1), and then dividing by 8 as in (2).

Proceeding in this way we obtain:

640*480*3*10 = 9,216,000 bits ⇒    1,152,000 bytes.

640*480*3*12 = 11,059,200 bits ⇒   1,382,400 bytes.

640*480*3*14=   12,902,400 bits ⇒  1,612,800 bytes.

8 0
4 years ago
Hi im new and would like you to answer​
soldier1979 [14.2K]

Answer:

Explanation:yes

7 0
4 years ago
Which topology requires a multipoint connection?
Nina [5.8K]
It's C) Bus Bus topology requires a multipoint connection
5 0
4 years ago
Other questions:
  • Which of the following represent typical account fees?
    7·1 answer
  • Which statement is used to create a file object that will append data to an existing file? BufferedWriter salesdata =
    9·2 answers
  • What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
    12·1 answer
  • Help me out with this .....
    10·1 answer
  • The velocity dimension of Big Data refers to _____.
    15·1 answer
  • The write-ahead logging (WAL) protocol simply means that Select one: a. the log record for an operation should be written before
    7·1 answer
  • How are computers used in education and entertainment? List them.​
    10·1 answer
  • Select all the correct answers.
    8·1 answer
  • CLS
    12·1 answer
  • PYTHON CODING QUESTION
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!