answersLogoWhite

0


Best Answer

Worms

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the term for self-replicating malware programs designed to damage a network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Communications

TV stations NOT affiliated with a network to air the networks programs is called a?

Independent, or non-affiliated station.


What is a network certification for?

The Network+ certification is sponsored by CompTIA, which is the Computing Technology Industry Association (formerly ABCD: The Microcomputer Industry Association). The Network+ exam contains situational, traditional, and identification types of questions. All of the questions are multiple choice, and there is only one answer for each question. The Network+ exam is open to anybody, although it is designed to be taken by those with at least 18 months of on-the-job experience as a network technician, as well as the A+ certification or equivalent knowledge.


What are the advantages and disadvantages of network database model?

Network Database model was designed to solve some of Hierarchical Database Model. Specifically this solves the problem of data redundancy by representing relationships in terms of sets.ADVANTAGESOrganization: Information is grouped into entities/records and each entity has attributes, which correspond to column headings.Very efficient in retrievalConceptually simple and easy to designCan handle the diverse sort of relationships (one-to-many and many-to-many relationships)Clear line of demarcation between programs and the complex physical storage details. Application programs work independently of the data.DISADVANTAGESAll the records have to maintain using pointers thus the database structure becomes more complex. Network model large number of pointers is required to insertion, deletion and updating.


How can installation of a firewall give an organization false of sense of security?

Installation of a firewall can give a false sense of security, because many users do not understand the limitations of a firewall. Specifically, a firewall primarily defends against unsolicited incoming attacks: a hacker tries to access the internal network from the outside. Firewalls often fail to effectively protect from threats from the inside: viruses (malware of all sorts, worms, etc), once active on the inside, may be able to spread within the network, and spawn network activity that traverses the firewall in both directions.


What companies offer cheap voip alternatives?

Depending on what one is specifically looking for in a cheap VOIP alternative, there are many options. If one is looking to connect within the same network/operating on the same program, then there are programs such as Skype, Facetime, Ekiga, Oovoo, and Google Chat. Alternatively, there are options such as 8x8 which allows one individual to call another out of the network.

Related questions

What is ment by grayware?

Grayware is a general term sometimes used as a classification for applications that behave in a manner that is annoying or undesirable, and yet less serious or troublesome than Malware. Grayware encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that are designed to harm the performance of computers on your network.


What could damage the network or the computers attached to the network with malware?

Various virus on internet could affect. Malware's could be used to harm the computer.


What network duplicates its code to the hosts on a network often without any user intervention?

malware


19. This type of malware is designed to bypass the normal authentication process?

This type of malware is referred to as an authentication bypass malware. It is designed to exploit vulnerabilities in the authentication process to gain access to a system or network without having the proper credentials. Authentication bypass malware can be used by attackers to gain access to sensitive data install malicious software or disable system security features. Exploit vulnerabilities in the authentication process Gain access to a system or network without having the proper credentials Gain access to sensitive data Install malicious software Disable system security featuresAuthentication bypass malware is dangerous because it can allow an attacker to gain access to a system without the proper authorization. It is important to ensure that authentication processes are secure and updated regularly to prevent these types of attacks.


What layer programs access the network?

Network Layer


What is network design?

First step to design a network is to prepare a layout . Then Protocols which are to be applied are decided. A network can be designed on Packet tracer (software) .


An anti-malware policy is meant to protect the network from damage and downtime true?

True.


What problems would you have on your computer if you had a malware virus?

# Website redirection You type in an address and it takes you to another site. # Home page hijack Your homepage is changed by the malware and you cannot change it back # Your network connection's activity lights blink a lot as the malware keeps downloading malware from different malware sites. # Your computer slows down # Your mouse moves really slow # Windows of programs open slowly # Your internet web pages open slowly or sometimes never open # There is constant pop ups # There is constant fake messages that your computer is infected by spyware and you need to download their advertised programs (also fake spyware Trojans ) # Constant errors and Page Crashes # Your computer crashes and reboots.


How do you stop viruses on your computer?

You should always have an anti-virus and anti-malware program running when you are connected to the internet. Windows Firewall is only designed to prevent unauthorized access from a network, not for general protection from harmful programs. There are numerous commercial antivirus programs (Norton, MacAfee), several of which may be suggested when you first begin using your computer. The default Windows security program is Windows Defender, but there is a separate program, Microsoft Security Essentials, that has a slightly broader range of coverage.


A computer on a network that acts as the central storage location for programs and data used on the network is what?

A computer on a network that acts as the central storage location for programs and data used on a network is a server.


What is the Computer on a network that acts as a central storage location for programs and data used on the network?

A computer on a network that acts as the central storage location for programs and data used on a network is a server.


Which type of malware can copy itself over a network without involving a host program?

Worms.