In: Computer Science
Match them please
Changes its signature with each copy made during replication
completely rewrites itself each time it is replicated, sometimes changing its behavior
exploits browser and plugin vulnerabilities to download and install malware without the user's knowledge, with the user having been specifically targeted
a website with multiple transparent or opaque layers, tricking the user into clicking on a different button than they intended
a seemingly useful program that contains hidden harmful code
A. |
watering hole |
B. |
trojan horse |
C. |
worm |
D. |
rootkit |
E. |
polymorphic virus |
F. |
clickjacking |
G. |
metamorphic virus |
H. |
bot |
I. |
spyware |
1). Changes its signature with each copy made during replication : E
2). Completely rewrites itself each time it is replicated, something changing its behavior :G
3). Exploits browser and plugin vulnerabilities to download and install malware without the user's :A
knowledge, with the user having been specifically targed
4). A website with multiple transparent or opaque layers, tricking the user into clicking on a different : F
button than they intended
5). a seemingly useful program that contain harmful code : B
Explanation:-