Answered step by step
Verified Expert Solution
Question
1 Approved Answer
ACROSS DOWN 3 Updates that will be downloaded and 1 An attacker who controls a botnet. installed automatically. 2 Enhancements to software to provide 8
ACROSS DOWN 3 Updates that will be downloaded and 1 An attacker who controls a botnet. installed automatically. 2 Enhancements to software to provide 8 Highest level user account. new or expanded functionality 10 Malicious computer code that 4 Database of viruses used to identify an reproduces itself. infected file. 12 Malicious program that uses a comptuer 5 Programs that deliver unwanted network to replicate. advertising content 18 Hardware/software designed to limit the 6 Type of virus infection that divides spread of malware. malicious code into several parts placed 19 The outcome or result of malware being at random positions. activated. 7 Type of account intended for temporary 20 Gives access to a program/service by users. circumventing normal security 9 Software that gathers user information protections. without consent. 23 Publicly released software security 11 When malware can trigger code update. execution on one computer from another 25 A copy of hard drive files stored in a via a network. secure location. 13 Cumulative package of all patches and 27 An computer under the remote control of feature updates. an attacker. 14 Code that lies dormant until triggered by 29 Software/hardware that captures and a specific event stores keystrokes. 15 Common type of data file viruses. 30 Wide variety of damaging software 16 Technique used by AV software to spot programs. virus characteristics rather than 31 A logical computer network of zombies matching a signature. under the control of an attacker. 17 A disguised program. 32 Software used to detect/remove viruses. 21 Windows function that obtains user 33 Malware's attempt at avoiding detection approproval before allowing a program is known as: to change computer settings. 22 Feature incorporated within a browser that stops advertisements from appearing 24 Malware that prevents normal use until a fee is paid. 26 Software used to detect/remove spyware. 28 Type of virus infection that attaches itself to the end of the infected file. CIS-135 - Introduction to Cybersecurity Chapter 3 Crossword Puzzle 12 19 25
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started