A ______________is a program that can infect other programs by modifying them,the
modification includes a copy of the virus program which can go on to infect other programs
 a)Worm b)Virus c)Zombie d) Trpdoors

1 Answer

Answer :

b)Virus

Related questions

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb

Last Answer : c) Trojan Horses

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. a) True, False b) False, True c) True, True d) False, False

Last Answer : c) True, True

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Worm C) Trojan Horses D) Logic Bomb

Last Answer : C) Trojan Horses

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus

Last Answer : d) Virus

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : When rewiring or modifying a circuit How do you conduct any necessary checks to ensure that the completed modification or rewiring complies with all appropriate standards?

Last Answer : If a circuit is being changed, first make a modified drawing tofulfill the requirement. Once you have the correct modifieddrawing, get the wiring changed. test the circuit for safety ... ensure what you have done is correct. Compare themodified drawing against the standards you followed.

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Can Mosquitoes Infect People with the AIDS Virus Just By Biting Them?

Last Answer : Nope.

Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy

Last Answer : C. Hacking

Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy

Last Answer : C. Hacking 

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk. A) Dormant phase B) Propagation phase C) Triggering phase D) Execution phase

Last Answer : B) Propagation phase

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus

Last Answer : d) Computer Virus

Description : Did the CIA, under the Nixon administration, deliberately infect Cuba with the swine flu virus?

Last Answer : too bad he didn’t

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above

Last Answer : d. None of the above

Description : A virus must do what to reproduce? a) form a latent virus b) undergo transformation c) infect a cell d) conjugate 

Last Answer : ANSWER: C -- INFECT A CELL

Description : Virus that infect bacteria are called (a) Bacteriophages (b) Basophils (c) Basal body (d) Basidiospores 

Last Answer : (a) Bacteriophages 

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description : ______________is a branch of science that deals with programing the systems in such a way that they automatically learn and improve with experience A. Machine Learning B. Deep Learning C. Neural Networks D. None of these

Last Answer : A. Machine Learning 

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : The process of learning include which of the following Options: A) Synthesis And Organization Of The Old And New Experiences, Resulting In A Novel Pattern. B) It Includes All Activities Which ... its Simplest Form, Learning Means Acquisition, Retention And Modification Of Experience D) All Of These

Last Answer : D) All Of These 

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : Which of following is not a rule of digital forensics? A. An examination should be performed on the original data B. A copy is made onto forensically sterile media. New media should always be used ... D. The examination must be conducted in such a way as to prevent any modification of the evidence.

Last Answer : A. An examination should be performed on the original data 

Description : E-marketing strategies includes a) Search Engine Market b) Online Public Relation c) Email- marketing d) All of the above.

Last Answer : d) All of the above.

Description : Types of major online marketing domains includes a. business to consumer b. business to business c consumer to business d. all of above

Last Answer : b. business to business

Description : Forms of direct marketing includes- a. direct mail marketing b. catalog marketing c. personal selling d. all the above

Last Answer : d. all the above

Description : What is an arrangement made between marketing site that direct users from one site to the other? a) Spam b) Viral marketing c) Affiliate programs d) None of the above

Last Answer : c) Affiliate programs

Description : Which process is used to reinstall data from a copy when the original data has been lost? a) Backup b) Recovery c) Benchmarking d) Data cleansing

Last Answer : b) Recovery

Description : Slug Line are the words to identify news copy/story: A. Correct B. Incorrect

Last Answer : A. Correct

Description : How do you feel about several states having weather modification programs?

Last Answer : I’ve been aware of cloud seeding for several years. Do you consider it a bad thing?

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a) Affiliate programs b) Click-through c) Spam d) All of the above

Last Answer : b) Click-through

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Spam B. Viral marketing C. Affiliate programs D. None of the above

Last Answer : B. Viral marketing

Description : The simultaneous processing of two or more programs by multiple processors is calleda. Multi-processing b.Multi-tasking c. Multi-sharing d. All of the these

Last Answer : a. Multi-processing