Software programs that conceal presence and disguise system compromise Malicious exploitation of domain name servers (DNSS) to redirect traffic to an imposter Web site Software that invades computers or observes usage habits without permission An undocumented or unauthorized entry that bypasses normal authentication methods A beneficial security practitioner who excels securing and testing computer networks Software that displays unsolicited or unwanted advertisements

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Match the key terms with their definitions.
Software programs that
conceal presence and
disguise system
compromise
Malicious exploitation of
domain name servers
(DNSS) to redirect traffic
to an imposter Web site
Software that invades
computers or observes
usage habits without
permission
1.
Rootkit
An undocumented or
unauthorized entry that
bypasses normal
authentication methods
2.
Virus
3.
Backdoor
A beneficial security
practitioner who excels
securing and testing
computer networks
4.
Pharming
5.
Phishing
Software that displays
6.
Worm
unsolicited or unwanted
advertisements
7.
Ethical hacker
>
Transcribed Image Text:Match the key terms with their definitions. Software programs that conceal presence and disguise system compromise Malicious exploitation of domain name servers (DNSS) to redirect traffic to an imposter Web site Software that invades computers or observes usage habits without permission 1. Rootkit An undocumented or unauthorized entry that bypasses normal authentication methods 2. Virus 3. Backdoor A beneficial security practitioner who excels securing and testing computer networks 4. Pharming 5. Phishing Software that displays 6. Worm unsolicited or unwanted advertisements 7. Ethical hacker >
7.
Ethical hacker
Self-replicating software
program that infects local
computer files
8.
Trojan
9.
Bot
Seemingly harmless
program that disguises
harmful behavior
10. Adware
11. Logic bomb
Self-replicating software
program that remotely
infects computers across
12. Spyware
networks
Code that executes a
hidden payload when
certain conditions or time
constraints are met
Attacks that trick users
into revealing credentials
or confidential information
A robot that executes
remote commands or
operates autonomously
>
>
>
>
Transcribed Image Text:7. Ethical hacker Self-replicating software program that infects local computer files 8. Trojan 9. Bot Seemingly harmless program that disguises harmful behavior 10. Adware 11. Logic bomb Self-replicating software program that remotely infects computers across 12. Spyware networks Code that executes a hidden payload when certain conditions or time constraints are met Attacks that trick users into revealing credentials or confidential information A robot that executes remote commands or operates autonomously > > > >
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Hyperlinks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education