in Technology by
________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

1 Answer

0 votes
by

________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

Related questions

0 votes
    In ________ type of IT setup, developers or operations teams automatically manage and provision the technology ... scripts 3. Infrastructure automation 4. Infrastructure as Code...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Which one of the following is also referred to as malicious software? Maliciousware Badware Ilegalware Malware...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    If a transaction does not modify the database until it has committed, it is said to use the ___________ ... from Recovery topic in division Recovery System of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    ________ is the term that is used to refer to the method by which a malicious portable executable has reached ... Attack Trajectory Line of attack Attack Strategy Chain of attack...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    In a phishing, attackers target the ________ technology to so social engineering. (a) Emails (b) WI-FI network ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    A computer ________ is a malicious code which self-replicates by copying itself to other programs. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a spot from where attackers seek information? (a) Domain name (b) IP address (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Caching Technique where cache is populated the first time a certain piece of data is requested is called _________. (a)Local ... (b)Lazy Loading (c)Cache aside (d)Upfront Loading...
asked Oct 6, 2020 in Technology by JackTerrance
...