BCIS Unit 13

Ace your homework & exams now with Quizwiz!

Select what's true about Trojan malware.

-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewalls -similar to viruses, but do not replicate themselves

intially, the US computer emergency response team determine that meltdown and spectre vulnerabilities would necessitate replacing the impacted chips, but in january 2018 google announced it developed ____, a strategy to mitigate the meltdown and spectre vulnerabilities.

Retpoline

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator

Phishing

tricks users into revealing usernames and passwords by appearing legitimate

Ransomeware

when activated, encrypts files on user hard drive and then sells a decryption program


Related study sets

New World History & Geography Chapter 3

View Set

Passe Tenses: PQP, PC, Conditionnel Passe, Subjonctif Présent

View Set

ATI Head, Neck, and Neurological Test

View Set

Anatomy Chapter 7 The Skeletal Assessment

View Set

svarbiausi XVIII a. - XIX a. kuriniai

View Set

Psychology chapter 15 Psychological Disorders

View Set