…………… programs can be used to accomplish functions indirectly that an unauthorized user could  not accomplish directly.
A) Zombie
B) Worm
C) Trojan Horses
D) Logic Bomb

1 Answer

Answer :

C) Trojan Horses

Related questions

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus

Last Answer : A) Trap doors

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Which of the following uses the spawn mechanism to duplicate itself ? (1) Trojan horse (2) Worm (3) Keystroke logger (4) Logic bomb

Last Answer : Worm

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Trap doors B) Trojan horse C) Logic Bomb

Last Answer : C) Logic Bomb

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : a) Trap doors

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : The agency that sits between the user and the UNIX system is called the A. logic B. profile C. shell D. erxc E. None of the above

Last Answer : C. shell

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : What’s the difference between a virus, a worm, a Trojan and spyware?

Last Answer : All these types of malicious software, or malware, pose a serious threat to your computer and data. 4 A virus invades a computer and copies, deletes or damages data. 4 A worm is a ... numerous pop-up ads, and may steal your personal information or change your computer settings without your knowing.

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : Native – protocol pure Java converts ……….. into the ………… used by DBMSs directly. A) JDBC calls, network protocol B) ODBC class, network protocol C) ODBC class, user call D) JDBC calls, user call

Last Answer : A) JDBC calls, network protocol

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In UNIX, processes that have finished execution but have not yet had their status collected are known as ................ (A) Sleeping processes (B) Stopped Processes (C) Zombie Processes (D) Orphan Processes

Last Answer : (C) Zombie Processes 

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : Is it possible to live healthily on a diet that is not directly or indirectly connected to the harm of living beings?

Last Answer : Many plants make their seeds and die. So we can use all the seeds and use nuts. Root vegetables make themselves and die so we can use all root vegetables. Legumes also grow their seed pods ... pick some without killing the plant and all the cabbagy plants that die after they make their vegetable.

Description : Even if among friends, how does joking about anything gay affect those directly or indirectly involved in the joke?

Last Answer : It really depends on the intent behind the joke - mean spirited or bigoted comments are usually very recognizable. Otherwise, I'm just a guilty as the next person for joking about stereotypes. It's definitely ... continue in the same vein, then that's not someone that I'm going to hang out with.

Description : What one factor distinguishes reports developed directly from those developed indirectly?

Last Answer : What is the answer ?

Description : Will not be directly or indirectly involved means?

Last Answer : Need answer

Description : Which of the following statements regarding the complement system are true? a. Complement activation yields products which are directly cytotoxic as well as products which act indirectly via activated ... and classical pathways converge proximal to generating the membrane attack complex (C5b-9)

Last Answer : Answer: a, d The complement system is composed of two different but linked sequences, the classic and alternative pathways. The pathways involve serum proteins that act to amplify the inflammatory-immune ... the C5 level proximal to generating the membrane attack complex (C5b-9) (Figure 6-3)

Description : The members of the Panchayat Samiti are - (1) nominated by the Block Development officer (2) nominated by the Zila Panchayat Chairman (3) directly elected by the people (4) indirectly electred by the members of the Village Panchayat

Last Answer : (3) directly elected by the people Explanation: The voters of the State Legislative Assembly of the region directly elect members of the Panchayat Samiti. All the Pradhans of the Gram Panchayat within ... of the Rajya Sabha residing in that block-all are ex-officio members of the Panchayat Samiti.

Description : The members of the Legislative Assembly are – (1) indirectly elected (2) directly elected by the people (3) partly elected and partly nominated by the Governor (4) mainly nominated

Last Answer : (2) directly elected by the people Explanation: Members of a Legislative Assembly (Vidhan Sabha) are direct representatives of the people of the particular state as they are directly elected by an electorate ... outlined in the Constitution of India is not more than 500 members and not less than 60.

Description : Which one of the following statements reflects the republic character of Indian democracy? (1) Written Constitution (2) No State religion (3) Devolution of power to local Government institutions (4) Elected President and directly or indirectly elected Parliament

Last Answer : (4) Elected President and directly or indirectly elected Parliament Explanation: Democracy is a system of government that allows the citizens to cast vote and elect a government of their choice. ... citizens the right to vote irrespective of their caste, colour, creed, religion and gender.

Description : A ‘republic’ is a state in which the Head of the State is - (1) nominated by the Prime Minister. (2) elected, directly or indirectly, by the people. (3) selected by the ruling party. (4) self-appointed.

Last Answer : (2) elected, directly or indirectly, by the people Explanation: A ‘republic’ is a state in which the head of the State is directly or indirectly or appointed by the people. Currently, 135 of their official names.

Description : Appropriate government means in relation to a public authority which is  established, constituted, owned, controlled or substantially financed by funds provided  directly or indirectly by a) The Central government b) The State government c) Union territory administration d) All the above

Last Answer : d) All the above

Description : Costs that are not directly related to the products or services of the project, but are indirectly related to performing the project. A. Intangible Costs B. Sunk Cost C. Tangible Costs D. Indirect Costs

Last Answer : D. Indirect Costs

Description : doesn’t need a linker to load it and is loaded _ a. Indirectly b. Directly c. Extending d. None of these

Last Answer : b. Directly

Description : Auditor’s responsibility for detecting noncompliance is limited to those: a. Direct-effect noncompliance. b. Material direct-effect noncompliance. c. Material indirect-effect noncompliance. d. All noncompliance since they affect the financial statements directly or indirectly

Last Answer : Material direct-effect noncompliance

Description : Mark the correct option a) No Govt. servant shall use his position or influence directly or indirectly to secure employment for any member of his family in any company. b) A Govt. servant shall, as soon ... firm, intimate such acceptance to the prescribed authority. c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : Name the organisms which do not derive energy directly or indirectly from sun. (a) Chemosynthetic bacteria (b) Pathogenic bacteria (c) Symbiotic bacteria (d) Mould

Last Answer : (a) Chemosynthetic bacteria

Description : Pick up the correct statement from the following: (A) In hydrometer method, weight Wd per ml of suspension is found directly (B) In pipette analysis, weight Wd per ml of suspension is found indirectly (C) In pipette analysis, weight Wd per ml of suspension is found directly (D) None of these

Last Answer : (C) In pipette analysis, weight Wd per ml of suspension is found directly

Description : According to Gay-Lussac law, the absolute pressure of a given mass of a perfect gas varies __________ as its absolute temperature, when the volume remains constant.  A. directly  B. indirectly

Last Answer : Answer: A

Description : The rate of hydration is ___________proportional to the generation of heat (a) Directly (b) Indirectly (c) Equally (d) None of these

Last Answer : (a) Directly