Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . What do you know about Expert systems? Is it true: otherwise known as knowledge - based systems, these use artificial intelligence ( AI

1. What do you know about Expert systems? Is it true: otherwise known as knowledge-based systems, these use artificial intelligence (AI) to solve complex problems. They are systems that emulate the decision-making ability of a human expert.2. What do you know about Inference engines? Is it true: a computer program that tries to derive answers from a knowledge base. It is the brain that expert systems use to reason about the data in the knowledge base for the ultimate purpose of formulating new conclusions.3. What do you know about rule-based programming? Is it true: a common way of developing expert systems, with rules based on if-then logic units, and specifying a set of actions to be performed for a given situation.4. What do you know about artificial neural networks (ANN)? Is it true: a mathematical or computational model based on the neural structure of the brain.5. What Is a Virus? Is it true: A virus is a segment of code that searches out hosts and infects them by embedding a copy of itself. When the infected host executes, the embedded virus is executed, which propagates the infection.6. What do you know about Malware Components. Is it true? It is common for malware to have six main elements, although it is not necessary for them all to be in place: Insertion Installs itself on the victims system Avoidance Uses methods to avoid being detected Eradication Removes itself after the payload has been executed Replication Makes copies of itself and spreads to other victims Trigger Uses an event to initiate its payload execution Payload Carries out its function (that is, deletes files, installs a back door, exploits a vulnerability, and so on).7. Is it true? In the digital world, worms are just little programs, and like viruses they are used to transport and deliver malicious payloads. One of the most famous computer worms is Stuxnet, which targeted Siemens supervisory control and data acquisition (SCADA) software and equipment. It has a highly specialized payload that was used against Irans uranium enrichment infrastructures with the goal of damaging the countrys nuclear program.8. Is it true? When a system is successfully compromised, an attacker may attempt to elevate his privileges to obtain administrator or root userlevel access. Once the level of access is achieved, the attacker can upload a bundle of tools, collectively called a rootkit. The firstthing that is usually installed is a back-door program, which allows the attacker to enter the system at any time without having to go through any authentication steps. The other common tools in a rootkit allow for credential capturing, sniffing, attacking other systems, and covering the attackers tracks.Is it true? Virus A small application, or string of code, that infects host applications. It is a programming code that can replicate itself and spread from one system to another. Macro virus A virus written in a macro language and that is platformindependent. Since many applications allow macro programs to beembedded in documents, the programs may be run automatically whenthe document is opened. This provides a distinct mechanism by whichviruses can be spread.Compression viruses Another type of virus that appends itself toexecutables on the system and compresses them by using the userspermissions.Stealth virus A virus that hides the modifications it has made. Thevirus tries to trick antivirus software by intercepting its requests to theoperating system and providing false and bogus information.Polymorphic virus Produces varied but operational copies of itself.A polymorphic virus may have no parts that remain identical between infections, making it very difficult to detect directly using signatures. Multipart virus Also called a multipartite virus, this has several components to it and can be distributed to different parts of the system. It infects and spreads in multiple ways, which makes it harder to eradicate when identified. Self-garbling virus Attempts to hide from antivirus software by modifying its own code so that it does not match predefined signatures. Meme viruses These are not actual computer viruses, but types of e-mail messages that are continually forwarded around the Internet. Bots Software applications that run automated tasks over the Internet, which perform tasks that are both simple and structurally repetitive. Malicious use of bots is the coordination and operation of an automated attack by a botnet (centrally controlled collection of bots).Worms These are different from viruses in that they can reproduce on their own without a host application and are self-contained programs. Logic bomb Executes a program, or string of code, when a certain event happens or a date and time arrives. Rootkit Set of malicious tools that are loaded on a compromised system through stealthy techniques. The tools are used to carry out more attacks either on the infected systems or surrounding systems. Trojan horse A program that is disguised as another program with the goal of carrying out malicious activities in the background without the user knowing. Remote access Trojans (RATs) Malicious programs that run on systems and allow intruders to access and use a system remotely.Immunizer Attaches code to the file or application, which would fool a virus into thinking it was already infected. Behavior blocking Allowing the suspicious code to execute within the operating system and watches its interactions with the operating system, looking for suspicious activities.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Secrets Of Analytical Leaders Insights From Information Insiders

Authors: Wayne Eckerson

1st Edition

1935504347, 9781935504344

More Books

Students also viewed these Databases questions

Question

=+c) Why did the researcher remove the Rent Index from the model?

Answered: 1 week ago