What type of malicious software masquerades as legitimate software to entice the user to run it?

Answers

Answer 1
Answer:

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.


Related Questions

Define the role of websites in internet.also write the importance of internet in our daily life.
99 POINTS HELP ASAP PLEASE!!!Select the mathematical statement that is true. A.22 % 2 > −3 B.22 % 2 < 5 C.22 % 2 == 4 D.22 % 2 != 1This is for my python coding class thank you
1.What is the ITIL? A.A set of process-oriented best practices B.A group of metrics that govern the program C.Focuses on value delivery D.All of the above
A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statement "the living room floor is rectangular" is an example of a(n) . The length and width of the room are examples of information, which you can obtain as from the user.
Consider the method total below:public static int total (int result, int a, int b){ if (a == 0) { if (b == 0) { return result * 2; } return result / 2; } else { return result * 3; }}The assignment statementx = total (1, 1, 1);must result in:A. x being assigned the value 3 B. x being assigned the value 7C. x being assigned the value 5D. x being assigned the value 2E. x being assigned the value 0

. How are returnspredicted in modern microprocessors?

Answers

Answer:

Return are predicted in the modern microprocessor as, branch predictor is the modern method for the processor for the prediction. The basic function of the branch predictor is improving in the pipeline instruction. It is basically the important part for implement the execution and the pipe lining. And the return predicted uses the call by reference technique for the data in instruction.

1. What is the host name that is resolved? 2. What is the probable IPv6 address of the attacker? 3. What is the probable IPv6 address of the attacked? 4. How do the IPv6 addresses you identified in questions b and c correlate to the top talkers list you made in Step 3?

Answers

Explanation:

The given question statement has been referenced from c h12_Osscan.pcapng document

The answers to the questions are;

Q1_Answer ; The host name that has been resolved is win7_03

Q2_Answer ; The likely IPv6 address of the attacker is 10.1.0.103

Q3_Answer ; The likely IPv6 address of the attacker is 10.1.0.102

Q4_Answer ; According to the document, it has been mentioned that the IP's stated above have been the top talkers meaning that there was significant communication or exchange of information between them

Create an application (that uses the SortedABList) that allows a user to enter a list of countries that he or she has visited and then displays the list in alphabetical order, plus a count of how many countries are on the list. If the user mistakenly enters the same country more than once, the program should inform the user of their error and refrain from inserting the country into the list a second time.

Answers

Answer:

import java.util.*;

public class Country

{

  public static void main(String args[])

  {

      char ch,temp;

      int flag = 0;

      String country;

      ArrayList<String> countries = new ArrayList<String>();

      Scanner sc = new Scanner(System.in);

      do

      {

          System.out.println("enter the country you have visited:\t");

          country = sc.next();

          for(int i=0;i<countries.size();i++)

          {

              if(countries.get(i).equals(country))

              {

                  System.out.println("you have already entered the country");

                  flag = 1;

                  break;      

              }

          }

          if(flag == 0)

          {

              countries.add(country);

              flag = 0;

          }

          System.out.println("want to add another country(y/n):\t");

          ch = sc.next().charAt(0);

      }while(ch!='n');

      Collections.sort(countries);

      System.out.println("Countries you have visited:\t"+countries);

      System.out.println("Total number of contries visited:"+countries.size());

     

  }

}

Explanation:

What is touch-typing?typing with a keyboard shortcut
typing with macros
typing with only one hand
typing without looking at the keyboard

Answers

Typing without looking at the keyboard and using all fingers. I do this, so I'm 99% that's the correct answer.
Typing without looking at the keyboard.

Last one

Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching configuration and decides to copy the bootmgr file from the working computer to the computer with the problem. However, your friend is having problems finding the bootmgr file and asks for your help. What is your best response?

Answers

Answer:

He should remove any removable devices from the PC , change the boot device to USB or CD drive and insert the installation disk or a created ISO USB file to install

Explanation:

A _____ area network is one step up from a _____ area network in geographical range.

Answers

Answer:

A metropolitan area network is one step up from a local area network in geographical range.

Explanation:

A metropolitan area network is one step up from a local area network in geographical range.

A network is a group of devices connected together for communication. Networks can be classified according to the area they cover, A metropolitan area network is smaller than a wide area network but larger than a local area network.

A local area network consist of computers network in a single place. A group of LAN network form a metropolitan network

A metropolitan network is a network across a city or small region. A group of  MAN form a wide area network.