The most common way I receive a virus.
What is via an infected e-mail.
The type of malware attack shuts down a machine or network and making it inaccessible to the users.
What is a denial of service attack.
Hiding is what seems legitimate software I am designed to delete, modify, damage, block, or some other harmful action on your data or network.
What is a Trojan Horse.
How my system contracts a virus online.
What is visiting an infected website or viewing an infected website advertisement
How a logic bomb is different than a Trojan Horse.
What is a Trojan horse looks appealing, a logic bomb is hidden in anything, it does not need to be pretty.
A network administrator noticed data deletion, a reformatting a hard drive and knew they were dealing with....
What is a logic bomb
This type of attack occurs when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop.
What is a flood attack.
A victim of a phishing technique lost their password and a malicious program was planted and executed code that gained access to their network.
What is rootkit
The type of flood attack concept sends more traffic to a network address than the programmers have built the system to handle.
What is a buffer overflow attack.
Name three malware types and what they are compared to.
What is Virus -> Biological Virus; Trojan Horse -> Trojan Horse from the Battle of Troy; Worm -> Earthworm, Logic Bomb -> mine/grenade/bomb
I noticed a depleting system resources and a slowing of bandwidth across devices, so I was concerned my network was infected with....
What is a worm.
The difference between a Logic and Time Bomb.
What is a Logic Bomb needs to be triggered and Time Bomb just goes off.