A portion of the Polymorphic virus, generally called a …………………….. , creates, a random  encryption, key to encrypt the remainder of the virus.
A) mutual engine
B) mutation engine
C) multiple engine
D) polymorphic engine

1 Answer

Answer :

C) multiple engine

Related questions

Description : A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns. A) Boot Sector Virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : B) Polymorphic Virus

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key: Using ‘Z’ as bogus character. (A) TAXERTZENZ (B) EXTRANETZZ (C) EZXZTRZANZET (D) EXTZRANZETZ

Last Answer : (A) TAXERTZENZ 

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. (A) Entity (B) Constraints (C) Rules (D) Keys

Last Answer : (B) Constraints

Description : ................ is the ability of multiple process to co-ordinate their activities by exchange of information A) Synchronization B) Mutual Exclusion C) Dead lock D) Starvation

Last Answer : A) Synchronization

Description : ______was the first technique that posed a serious threat to virus scanners: a) Vulnerability Code b) Polymorphic Code c) Antimorphic Code d) None of These

Last Answer : b) Polymorphic Code

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : A contract creates (a) rights and obligations of the parties to it. (b) obligations of the parties to it. (c) mutual understanding between the parties to it. (d) mutual lawful rights and obligations of the parties to it.

Last Answer : (b) obligations of the parties to it.

Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : ………… is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : Nondisjunction of a chromosome results in which of the following diagnoses? a) Down Syndrome When a pair of chromosomes fails to separate completely and creates a sperm or oocyte that contains two ... genetic condition that may occur in a single family member as a result of spontaneous mutation.

Last Answer : a) Down Syndrome When a pair of chromosomes fails to separate completely and creates a sperm or oocyte that contains two copies of a particular chromosome (nondisjunction) Down syndrome results from three number 21 chromosomes.

Description : A direct method of deadlock prevention is to prevent the occurrence of ………….. A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption

Last Answer : C) Circular waits

Description : The following conditions of policy must be present for a deadlock to be possible. i) Mutual exclusion ii) Hold and wait iii) No preemption iv) Circular wait A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : ……………. Can be defined as the permanent blocking of a set of processed that either complete for system resources or communicate with each other. A) Deadlock B) Permanent lock C) Starvation D) Mutual exclusion

Last Answer : A) Deadlock

Description : ………………. Techniques can be used to resolve conflicts, such as competition for resources, and to synchronize processes so that they can cooperate. A) Mutual Exclusion B) Busy Waiting C) Deadlock D) Starvation

Last Answer : A) Mutual Exclusion

Description : …………… is a condition in which there is a set of concurrent processes, only one of which is able to access a given resource or perform a given function at any time. A) Mutual Exclusion B) Busy Waiting C) Deadlock D) Starvation

Last Answer : A) Mutual Exclusion

Description : .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes. A) Synchronization B) Mutual Exclusion C) Dead lock D) Starvation

Last Answer : D) Starvation

Description : A direct method of deadlock prevention is to prevent the occurrences of ................... A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption

Last Answer : C) Circular waits

Description : Match the following. i) Mutual exclusion a) A process may hold allocated resources while waiting assignment. ii) Hold and wait b) No resource can be forcibly removed from a process holding it. iii) No preemption c) Only one process may use ... , ii-c, iii-b C) i-b, ii-c, iii-a D) i-c, ii-a, iii-b

Last Answer : D) i-c, ii-a, iii-b

Description : A virtual memory based memory management algorithm partially swaps out a process. This is an example of (A) short term scheduling (B) long term scheduling (C) medium term scheduling (D) mutual exclusion

Last Answer : (C) medium term scheduling

Description : The “PROJECT” operator of a relational algebra creates a new table that has always (A) More columns than columns in original table (B) More rows than original table (C) Same number of rows as the original table (D) Same number of columns as the original table

Last Answer : (C) Same number of rows as the original table

Description : In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process? (A) Heap (B) Stack (C) Shared memory segments (D) Both Heap and Stack

Last Answer : (C) Shared memory segments 

Description : In UNIX, ............ creates three subdirectories: 'PIS' and two subdirectories 'progs' and ‘data’ from just created subdirectory 'PIS'. (A) mdkir PIS/progs PIS/data PIS (B) mkdir PIS progs data (C) mkdir PIS PIS/progs PIS/data (D) mkdir PIS/progs data

Last Answer : (C) mkdir PIS PIS/progs PIS/data

Description : Which of the following statement(s) is/are correct? (1) Persistence is the term used to describe the duration of phosphorescence. (2) The control electrode is used to turn the electron beam on and off. (3) ... which are focussed into a narrow beam directed at the face of CRT. (4) All of the above. 

Last Answer : All of the above.

Description : Reasoning strategies used in expert systems include ............... (A) Forward chaining, backward chaining and problem reduction (B) Forward chaining, backward chaining and boundary ... chaining, backward chaining and back propagation (D) Backward chaining, problem reduction and boundary mutation

Last Answer : (A) Forward chaining, backward chaining and problem reduction

Description : Of the following bariatric surgical procedures, which is the best procedure for long-term weight loss? a) Roux-en-Y The Roux-en-Y gastric bypass is the recommended procedure ... This procedure, which resulted in significant complications, has been largely replaced by gastric restriction procedures

Last Answer : a) Roux-en-Y The Roux-en-Y gastric bypass is the recommended procedure for longterm weight loss. In this procedure, a horizontal row of staples creates a stomach pouch with a 1-cm stoma that is anastomosed with a portion of distal jejunum, creating a gastroenterostomy.

Description : A portion of Rs.6600 is invested at a 5% per annum, while the remainder is invested at a 3% per annum. If the annual income from the portion earning a 5% per annum is twice that of the other portion, what is the ... investments after one year? a) Rs.270 b) Rs.370 c) Rs.250 d) Rs.280 e) None of these

Last Answer : 5x + 3y = z (Total Income) x + y = 6600 -(1) 5x= 2(3y) 5x – 6y = 0 -(2) By solving (1) and (2) we get, x = 3600 so y = 3000 (3600*5*1)/100 + (3000*3*1)/100 = 180 + 90 = 270 Answer: a)

Description : Given below is a sample of a portion of DNA strand giving the base sequence on the opposite strands. What is so special shown in it? 5′ _____ GAATTC _____ 3′ 3′ _____ CTTAAG _____ 5′ (a) ... completed (b) Deletion mutation (c) Start codon at the 5′ end (d) Palindromic sequence of base pairs

Last Answer : (d) Palindromic sequence of base pairs

Description : Assertion :- According to Hugo de Vries , it is mutation which causes speciation and hence called it saltation. Reason :- Mutations are random and dir

Last Answer : Assertion :- According to Hugo de Vries , it is mutation which causes speciation and hence called it ... . D. If both Assertion & Reason are false.

Description : The combination of ……………. And ………….. is often termed the local address of the local portion of the IP address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number D) All of the above

Last Answer : C) Subnet number and host number

Description : The combination of ........... and ............ is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number.

Last Answer : C) Subnet number and host number.

Description : .................. address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D

Last Answer : A) Class A

Description : What are the two main features of Genetic Algorithm? a) Fitness function & Crossover techniques b) Crossover techniques & Random mutation c) Individuals among the population & Random mutation d) Random mutation & Fitness function

Last Answer : a) Fitness function & Crossover techniques

Description : USB Key Encryption: How?

Last Answer : I don’t recall how. But I am pretty sure you can run TrueCrypt from the USB drive. Google for it. You should find something.

Description : Encryption of data is important to ensure its privacy. It is most commonly achieved by using a ____. A. public-key encryption B. private-key encryption C. password-key encryption D. character set encryption

Last Answer : A. public-key encryption

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : What are the advantages & disadvantages of public key encryption?

Last Answer : Advantages: a) Remove the restriction of a shared secret key between two entities. Here each entity can create a pair of keys, keep the private one, and publicly distribute the other one. b) The no ... using the long keys takes a lot of time. So it is not recommended for large amounts of text.

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software