A ……………… is a program that secretly takes over another Internet-attached computer and then  uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors

1 Answer

Answer :

B) Zombie

Related questions

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus

Last Answer : A) Trap doors

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Trap doors B) Trojan horse C) Logic Bomb

Last Answer : C) Logic Bomb

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Worm C) Trojan Horses D) Logic Bomb

Last Answer : C) Trojan Horses

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : a) Trap doors

Description : Match the following mechanisms for interrupting the execution of a process and their uses. i) Interrupt a) Call to an operating system function ii) Trap b) Reaction to an asynchronous external event iii) Supervisor Call c) Handling of a error ... -a, iii-b C) i-b, ii-c, iii-a D) i-a, ii-c, iii-b

Last Answer : C) i-b, ii-c, iii-a

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Is there a virus that attacks anti-virus program?

Last Answer : Yes, there were such viruses in the past. However, they usually wouled either prevent antivirus from starting, or getting updates, or would uninstall antivirus you have. What you described doesn’t look like a virus attacking your antivirus, though, more like some issue with AVG.

Description : In UNIX, processes that have finished execution but have not yet had their status collected are known as ................ (A) Sleeping processes (B) Stopped Processes (C) Zombie Processes (D) Orphan Processes

Last Answer : (C) Zombie Processes 

Description : What is the small white borer type worm that attacks Hickory Trees?

Last Answer : Need Answer

Description : Which of the following 8085 microprocessor hardware interrupt has the lowest priority? (A) RST 6.5 (B) RST 7.5 (C) TRAP (D) INTR 

Last Answer : Answer: D

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec

Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.

Description : Virus in a computer is a (1) Chemical that attacks silicon (2) Micro-organism that disturbs integrated circuits (3) Programme that damages the computer software (4) None of the above

Last Answer : Programme that damages the computer software

Description : A computer virus is (1) a chemical that attacks silicon. (2) a micro-organism that destroys integrated circuits. (3) data that the computer fails to handle. (4) a special kind of computer programme.

Last Answer :  a special kind of computer programme.

Description : ................. uses electronic means to transfer funds directly from one account to another rather than by cheque or cash? (A) M-Banking (B) E-Banking (C) O-Banking (D) C-Banking

Last Answer : (B) E-Banking

Description : An artificial neurons receives n inputs x1, x2,...,xn with weights w1,w2,...,wn attached to the input links. The weighted sum ............... is computed to be passed on to a non-linear filter ϕ called activation function to release the output. (A) Σ wi (B) Σ xi (C) Σ wi + Σ xi (D) Σ wi . Σ xi

Last Answer : (D) Σ wi . Σ xi

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm

Last Answer : Spawn

Description : In Java variables, if first increment of the variable takes place and then the assignment occurs. This operation is also called ............................. . A) pre increment B) post increment C) incrementation D) pre incrementation

Last Answer : A) pre increment

Description : Which one of the following is correct? (A) Java applets cannot be written in any programming language (B) An applet is not a small program. (C) An applet can be run on its own. (D) Applets are embedded in another applications. 

Last Answer : (D) Applets are embedded in another applications.

Description : The role of the M cell is to A- .trap virus in mucus and prevent entry B- induce apoptosis in virus-infected small intestinal epithelia cells C- pass bacteria or virus to underlying macrophages for ... and presentation of antigen D- they use their cilia to propel mucus out of the small intestine

Last Answer : pass bacteria or virus to underlying macrophages for processing and presentation of antigen

Description : Does the bad weather this winter make you secretly wish or seriously consider living in another part of the country?

Last Answer : answer:I usually love cold weather but this is exhausting. The streets in my neighborhood have been iced over for 2 weeks. It's hard to make plans because the weather worsens out of nowhere. I've had ... thought when I graduate in a few years arizona sounds nice even though I know I'd miss snow.

Description : There are two cliffs. They are each attached by a suspension bridge that takes 5 minutes to walk across, and is the only way to get to the other side. No one is allowed to cross the bridge unless ... the bridge, he'll wake up exactly when you reach the other side, and send you back)? -Riddles

Last Answer : You can't go as he is awake, he'll see you, but go when he doesn't see you. Then, turn back as he is waking up, pretending to go to the side you came from. Then, he'll figure you are unauthorized to set foot on the bridge, and send you to the side you want to get to.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Which of the following is correct regarding AIDS causative agent HIV? (a) HIV is enveloped virus containing one molecule of single-stranded RNA and one molecule of reverse transcriptase. (b) HIV ... ) HIV is unenveloped retrovirus. (d) HIV does not escape but attacks the acquired immune response

Last Answer : (d) HIV does not escape but attacks the acquired immune response.

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : Zoologists extracted the chemical that the Japanese beetle uses to attract a mate, and use it in a trap to reduce the beetle population. They are utilizing a A) hormone. B) pesticide. C) enzyme. D) pheromone. E) excretion.

Last Answer : D) pheromone.

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : The casual organism of Polio is - (1) A fungi (2) A virus (3) A worm (4) A bacteria

Last Answer : (2) A virus Explanation: Polio is a highly infectious disease caused by a virus. Its causative agent, poliovirus, was identified in 1908 by Karl Landsteiner. The polio virus invades the nervous system, and can cause total paralysis in a matter of hours.

Description : Polio disease is caused by - (1) Bacteria (2) Fungi (3) Virus (4) Worm

Last Answer : (3) Virus Explanation: Polio, or poliomyelitis, is a crippling and potentially deadly infectious disease. It is caused by the poliovirus.

Description : Which one of the following causes the Chikungunia disease? (1) Bacteria (2) Helminthic worm (3) Protozoan (4) Virus

Last Answer : (4) Virus Explanation: Humans and other primates are the natural hosts for the chikungunya virus. The virus is spread to humans by the bite of an infected female Aedes species mosquito.