2S week 10 assignment NS

  10.1 What are three liberal mechanisms that malware can use to increase? 10.2 What are foul-mouthed liberal categories of payloads that malware may raise? 10.3 What are illustrative phases of influence of a bane or intimate? 10.4 What mechanisms can a bane use to suppress itself? 10.5 What is the estrangement between machine-executable and macro banees? 10.6 What media can a intimate use to appropinquation distant regularitys to increase? 10.7 What is a “drive-by-download” and how does it contend from a intimate? 10.8 What is a “logic bomb”? 10.9 Differentiate unformed the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be give in the similar malware? 10.10 List some of the contendent levels in a regularity that a rootkit may use. 10.11 Delineate some malware countermeasure elements. 10.12 List three places malware decay mechanisms may be located. 10.13 Briefly delineate the foul-mouthed generations of antibane software. 10.14 How does behavior-blocking software labor? 10.15 What is a as sorted denial-of-service regularity? including references. No observation paste content.