Skip to content
Facebook Twitter Instagram
  • +1 (857) 445-0520
  • writehw@gmail.com
  • Home
  • How It Works
  • Reviews
  • FAQs
  • Contact Us
  • Blog
Menu
  • Home
  • How It Works
  • Reviews
  • FAQs
  • Contact Us
  • Blog
Order Now

HW3: Due 9/11

  • Pat admin
  • September 28, 2022
  • 7:39 am
  • No Comments

HW3
You should be submitted in Backboard CTEC350\ HW3:
See: Due Date in Blackboard
Chapter 3
Part1: Grade (5 points)

  1. Describe the different types of malicious software and what damage they can do
  2. Describe methods of protecting against malware attacks
  3. Describe the types of network attacks
  4. Identify physical security attacks and vulnerabilities
  5. Explain that the biggest problem with adware is that it slows down the computer it’s
    running on.
  6. Describe a Ping of Death attack as an attack that causes the victim computer to freeze and
    malfunction.
  7. What type of malware do you think is the most destructive: viruses, worms, Trojan
    programs, spyware, or adware?
    Part2: Grade (10points)
    Technical Notes for Activities
    Activity 3-1: This activity requires a Web browser, Internet connection, paper, and pencil
    Activity 3-2: This activity requires a Web browser and an Internet connection.
    Activity 3-3: This activity requires a Web browser and an Internet connection.
    Activity 3-4: This activity requires a Web browser, Internet connection, paper, and pencil.
    Activity 3-5: This activity requires a Web browser and an Internet connection.
    Part3: Grade (5 points)
    Define the Following Key Terms
     adware
     attack
     backdoor
     botnet
     buffer overflow attack
     computer security
     denial-of-service (DoS) attack
     distributed denial-of-service (DDoS) attack
     exploit
     keyloggers
     macro virus
    HW3
    You should be submitted in Backboard CTEC350\ HW3:
    See: Due Date in Blackboard
     malware
     network security
     Ping of Death attack
     ransomware
     rootkit
     shell
     spyware
     Trojan program
     virus
     virus signature file
     vulnerability
     whitelisting
     worm
     zombies
  • Any assignment received after the time of the class is considered late (NO EXCUSES) and is
    graded with 0
Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest
admin

admin

All Posts »
PrevPreviousHW2: Due 9/4
NextHW4: Due 9/18Next

Leave a Reply Cancel reply

You must be logged in to post a comment.

Homework Due?

Place Your Order Today

Place Order
Providing custom academic papers covers any academic levels, paper formats, and subjects.

Courses

  • English
  • History
  • Biology
  • Literature
  • Business
  • Mathematics

Quick Links

  • Home
  • How it Works
  • Reviews
  • FAQs
  • Contact
  • Blog

Legal & Payments

IntaSend Secure Payments (PCI-DSS Compliant) Secured by IntaSend Payments

© All rights reserved

Made with ❤ by Academic Websites