Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Malware matching DDoS Macro virus Kernal mode rootkit Worm SQL Fuzzing Static an

ID: 3859502 • Letter: M

Question

Malware matching DDoS Macro virus Kernal mode rootkit Worm SQL Fuzzing Static analysis XSS Escaping output Application firewall Language used by databases to store, retrieve, and modify data Dangerous attack against availability because it comes from several sources Examines source code to look for flaws that could lead to exploit MyDoom, Nimda, and CodeRed are examples Checks data intended for a specific program and verifies its correct format and content Indicates to the server that output is non-executable Testing a program through using invalid, unexpected, or random data as input Examines running binary programs on a device or in an emulator to determine their Heartbleed and shellshock are examples Has the ability to infect cross-platform because it's interpreted by an application program Stealth malware whose operation is unrestricted Allows attackers to inject client-side scripts into Web pages viewed by others

Explanation / Answer

DDoS                                     :

Dangerous attack against availability because it comes from several sources

SQL                                        :

Language used by database to store, retrieve and modify data

Fuzzing                                 :

Testing a program through using invalid, unexpected, or random data as input

XSS                                         :

(Cross Site Scripting) allows attackers to inject client-side scripts into web pages viewed by others

Static analysis                    :

Examines source code to look for flaws that could lead to exploit

Escaping output                                :

Indicates to the server that output is non executable

Marco virus                        :

Mydoom, Nimda and code red are examples

Kernel mode rootkit       :

Examines running binary program on a device or in an emulator to determine

                                                their behavior

Worm                                   :

Has the ability to infect cross platform because it’s interpreted by an application program

Application firewall         :

Checks data intended for a specific program and verifies its correct format and content

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote