Question

In: Computer Science

Let's say we have the following lines of pseudo-code in a program. What type of malware...

Let's say we have the following lines of pseudo-code in a program. What type of malware is in this code?

username = get_username();
password = get_password();
if username is "l33t h4ck0r":
  return PERMIT_ENTRY
if username and password are valid:
  return PERMIT_ENTRY
else
  return DENY_ENTRY

rootkit

spyware

trojan horse

backdoor

Solutions

Expert Solution

d) Backdoor

The backdoor fragment in a program allows user to access backdoor information without necessarily following the common security procedures needed.

In this case, once the programmer keys in the username he or she logs in without putting password.

Therefore, this is a backdoor fragment.

rootkit

A rootkit is a malicious software that allows an unauthorized user to have privileged access to a computer and to restricted areas of its software. A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers, password stealers, antivirus disablers, and bots for DDoS attacks

spyware

Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge.

trojan horse

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.

The answer is 100% correct

If you have any doubts, leave a comment below before rating. I'll be happy to assist you further

Please UPVOTE


Related Solutions

Let's say that we have two variables X and Y. We calculate their correlation value to...
Let's say that we have two variables X and Y. We calculate their correlation value to be r = -.8012. What is the interpretation of this value?
So let's say I got 60% in test. then we have to divide that into 2...
So let's say I got 60% in test. then we have to divide that into 2 so now I got 30% and then we have to add 50% to it. So my final test marks is 80%. write a function in C++ that takes a map<string, int> which represents a students name to their test marks and returns a map<string, double> which represents the upgraded marks. Please write this function without using any for or while loops. Example: Input: {{"Ved",...
So let's say I got 60% in test. then we have to divide that into 2...
So let's say I got 60% in test. then we have to divide that into 2 so now I got 30% and then we have to add 50% to it. So my final test marks is 80%. write a function in C++ that takes a map<string, int> which represents a students name to their test marks and returns a map<string, double> which represents the upgraded marks. Please write this function named "upgraded_marks" without using any for or while loops. Example:...
For the following program descriptions, write step by step pseudo code that shows you understand the...
For the following program descriptions, write step by step pseudo code that shows you understand the problem and what it takes to solve it. The first one is done for you as an example. Please answer the questions in the same format as the example problem below so it is the same. Example #1 Problem A customer is purchasing five items. Design a program where you collect the amount of each item, calculate the subTotal of the items, the tax...
To see for yourself how the central limit theorem works, let's say we have a normal...
To see for yourself how the central limit theorem works, let's say we have a normal distribution (with mean =100 and standard devation = 20). Let's generate some random samples of various sizes from this distribution. We can do this in excel using =norm.inv(rand(),100,20) and it will randomly generate numbers from this distribution. I generated four samples of size 5, 10, 20 and 30, and got the means of 124 (n=5); 91 (n=10); 105 (n=20); 103 (n=30). If I continue...
Write a MIPS assembly language program that implements the following pseudo-code operation: result = x +...
Write a MIPS assembly language program that implements the following pseudo-code operation: result = x + y – z + A[j] x and y should be in reserved memory words using the .word directive and labeled as x and y. Initialize x=10 and y=200. Read in z from the console. Input the value -8. This is the value for z, not for –z. Store this value in memory with the label z. To begin, you could just initialize z to...
Give a pseudo-code description for an array-based implementation of the deque ADT (Abstract Data Type). What...
Give a pseudo-code description for an array-based implementation of the deque ADT (Abstract Data Type). What is the running time for each operation?
What will be the expected output of the following pseudo code? Write exactly what would display...
What will be the expected output of the following pseudo code? Write exactly what would display when you execute the statements. Module main() Declare Integer a = 5 Declare Integer b = 2 Declare Integer c = 3 Declare Integer result = 0 Display "The value of result is" Display result Set result = a + b * c - a Display "Changed value is: ", result End Module
Let's now say we have $50 in a bank account and we deposit an additional $10 per month for 5 years.
Let's now say we have $50 in a bank account and we deposit an additional $10 per month for 5 years. The annual interest rate is 10%, compounded monthly. How much will we have in the account after 5 years rounded to the nearest dollar? A) $887 B) $692 C) $857 D) $665
Let's say for a chlorophyll solution we found the absorbance, and use d that with Beer's...
Let's say for a chlorophyll solution we found the absorbance, and use d that with Beer's law to find the concentration. How come that concentration is different if we find the concentration of the same chlorophyll solution using the fluorescence?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT