. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus  software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

1 Answer

Answer :

A) Stealth virus

Related questions

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns. A) Boot Sector Virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : B) Polymorphic Virus

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : State True or False. i) While overloading operators new operator can be overloaded. ii) The binary operator such as +, -, * and must explicitly return a value. A) True, True B) True, False C) False, True D) False, False

Last Answer : C) False, True

Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus

Last Answer : d) Computer Virus

Description : Having multiple perceptrons can actually solve the XOR problem satisfactorily: this is because each perceptron can partition off a linear part of the space itself, and they can then combine their results. ... have to be explicitly hand-coded d) False - just having a single perceptron is enough

Last Answer : c) True – perceptrons can do this but are unable to learn to do it – they have to be explicitly hand-coded

Description : In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk. A) Dormant phase B) Propagation phase C) Triggering phase D) Execution phase

Last Answer : B) Propagation phase

Description : ______was the first technique that posed a serious threat to virus scanners: a) Vulnerability Code b) Polymorphic Code c) Antimorphic Code d) None of These

Last Answer : b) Polymorphic Code

Description : What is Stealth Virus ?

Last Answer : This type of virus removes a portion of a file and occupies that space. This reduces the amount of computer memory.

Description : McAfee is an example of a) Photo Editing Software b) Quick Heal c) Virus d) Antivirus

Last Answer : d) Antivirus

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : The type(s) of auto executing macros, in Microsoft word is/are A) Auto execute B) Auto macro C) Command macro D) All of the above

Last Answer : D) All of the above

Description : A .................... architecture assigns only a few essential functions to the kernel, including address spaces, Inter process communication(IPC) and basic scheduling. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : B) Micro kernel

Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : A) Monolithic kernel

Description : ............... is a large operating system core provides a wide range of services. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : D) Macro kernel

Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : B) Monolithic kernel

Description : The translator which performs macro calls expansion is called : (A) Macro processor (B) Micro pre-processor (C) Macro pre-processor (D) Dynamic linker

Last Answer : (C) Macro pre-processor 

Description : Which of the following is not the approach to dealing with deadlock? A) Prevention B) Avoidance C) Detection D) Deletion

Last Answer : D) Deletion

Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : The start and stop bits are used in serial communication for (A) error detection (B) error correction (C) synchronization (D) slowing down the communication

Last Answer : (C) synchronization 

Description : In a moss, the sporophyte (a) manufactures food for itself, as well as for the gametophyte (b) is partially parasitic on the gametophyte (c) produces gametes that give rise to the gametophyte (d) arises from a spore produced from the gametophyte.

Last Answer : (b) is partially parasitic on the gametophyte

Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading

Last Answer : A) Encapsulation

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : Which one of the following features is absent in a virus? (1) reproduce within host cell (2) presence of cell wall (3) fully parasitic in nature (4) presence of either DNA or

Last Answer : (2) presence of cell wall Explanation: A virus has a simple structure. It has no internal cellular structure, no cell wall or cell membrane, just the protein coat that holds the string of nucleic ... is a layer located outside the cell membrane found in plants, fungi, bacteria, algae, and archaea.

Description : Which one of the following features is absent in a virus ? (1) reproduce within host cell (2) presence of cell wall (3) fully parasitic in nature (4) presence of either DNA or RNA

Last Answer : presence of cell wall 

Description : After studying and evaluating a client's existing internal control, an auditor has concluded that the policies and procedures are well-designed and functioning as intended. Under these circumstances, the ... risk at a lower level than would be set under conditions of weak internal control.

Last Answer : Set detection risk at a higher level than would be set under conditions of weak internal control.

Description : Using which keyword we can access value of the instance variables and class variables of that class inside the method of that class itself. A) super B) final C) this D) either super or this

Last Answer : C) this

Description : ............... package is used by compiler itself. So it does not need to be imported for use. A) java.math B) java.awt C) java.applet D) java.lang

Last Answer : D) java.lang

Description : A ……………. takes a reference to an object of the same class as itself as an argument. A) Reference constructor B) Copy Constructor C) Self Constructor

Last Answer : B) Copy Constructor

Description : The dereferencing operator ……… is used when the object itself is used width in the member pointer. A) ->* B) .* C) Any of the above D) None of the above

Last Answer : B) .*

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : Implicit return type of a class constructor is: (A) not of class type itself (B) class type itself (B) a destructor of class type (D) a destructor not of class type 

Last Answer : (B) class type itself

Description : If a function is friend of a class, which one of the following is wrong ? (A) A function can only be declared a friend by a class itself. (B) Friend functions are not members of a class, they are ... are members of a class. (D) It can have access to all members of the class, even private ones.

Last Answer : (C) Friend functions are members of a class.

Description : Do chromebooks have an antivirus? I gave myself a virus?

Last Answer : I am unaware of any antivirus for Chromebooks. Google builds antivirus into the OS, but that doesn't protect the computer from user error. Last year, I received a similar sounding email from a friend, ... make mistakes. I'm a very careful computer user, but I still revealed my password to a hacker.

Description : Recommended Mac OS virus scanner/antivirus?

Last Answer : answer:It's Unix based, just don't use a root account. This way if you download anything it would require root access to access system files, and obviously you wouldn't use your root password on ... that it comes with the Mac OS Server), worth checking out. http://en.wikipedia.org/wiki/Clam_AV

Description : I have a virus and I know the exact file it is from, but my pc will not allow me to delete it because it is "being used by another program" how do I get rid of this? My antivirus is doing nothing.

Last Answer : Fdisk it

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : What is a macro virus ?

Last Answer : This type of virus is often seen nowadays. Macro viruses are the first viruses to infect data files. Macro viruses are made up of macro or OLE objects and are very easy to write off from ... floppy disk or internal network of infected documents , e-mail attachments or file downloads on the Internet.

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : _____ infections have cost more money and taken more time to repair than any other virus type: a) File Infector Viruses b) Multi Partite Viruses c) Macro Viruses d) None of These

Last Answer : c) Macro Viruses

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : What is the proportion of sites that are polymorphic?

Last Answer : Feel Free to Answer