Test 1 Flashcards
1
Q
how long are IPv4 addresses
A
32-bit
2
Q
What is a network standards architecture ?
A
TCP/IP
3
Q
____ are pieces of code that attach to other programs and get executed when the infested program is executed
A
Viruses
4
Q
Pieces of code that are executed after the virus or worm has spread are called___
A
Payloads
5
Q
Malware programs that masquerade as system files are called
A
Trojan horses
6
Q
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________.
A
Phishing