1. List some of the different levels in a system that a rootkit may use.
2. Describe some malware countermeasure elements.
3. List three places malware mitigation mechanisms may be located.
4. Briefly describe the four generations of antivirus software.
5. List the activities that can be monitored by “behavior-blocking software”.
6. What is a DDoS attack?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here