Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Security_1 Matching
A virus requires:
Interaction from a user.
What is a virus?
Sting of code that cannot automatically spread from one computer to another, but can spread from file to file.
SMTP (Outgoing Email) Port Number(s):
25
POP3 Port Number(s):
110
A self-replication computer program:
Worm
Give an example of a logic bomb:
An attack executes ona system every three months.
What is the difference between a Trojan Horse and a Worm?
Worm self replicates while a Trojan Horse does not.
Kerberos Port Number(s):
88
Give an example of a Trojan:
Screen saver downloaded and installed and is now started to rename and delete random files.
How does a logic bomb differ from a worm?
Always has a data or time component
0:00

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Computers sets