…………… programs can be used to accomplish functions
indirectly that an unauthorized user could not accomplish directly.
a) Zombie
b) Worm
c) Trojan Horses
d) Logic Bomb

1 Answer

Answer :

c) Trojan Horses

Related questions

Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Worm C) Trojan Horses D) Logic Bomb

Last Answer : C) Trojan Horses

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : a) Trap doors

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : Which of the following uses the spawn mechanism to duplicate itself ? (1) Trojan horse (2) Worm (3) Keystroke logger (4) Logic bomb

Last Answer : Worm

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus

Last Answer : A) Trap doors

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Trap doors B) Trojan horse C) Logic Bomb

Last Answer : C) Logic Bomb

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : Palagiarism is unauthorized use of another person's copyright material without acknowledgment: A. Correct B. Incorrect

Last Answer : B. Incorrect

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : What’s the difference between a virus, a worm, a Trojan and spyware?

Last Answer : All these types of malicious software, or malware, pose a serious threat to your computer and data. 4 A virus invades a computer and copies, deletes or damages data. 4 A worm is a ... numerous pop-up ads, and may steal your personal information or change your computer settings without your knowing.

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. a) True, False b) False, True c) True, True d) False, False

Last Answer : c) True, True

Description : The atom bomb is an inherently a a. Political artifact. b. Social artifact. c. Cultural artifact. d. Economical artifact.

Last Answer : a. Political artifact.

Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : Is it possible to live healthily on a diet that is not directly or indirectly connected to the harm of living beings?

Last Answer : Many plants make their seeds and die. So we can use all the seeds and use nuts. Root vegetables make themselves and die so we can use all root vegetables. Legumes also grow their seed pods ... pick some without killing the plant and all the cabbagy plants that die after they make their vegetable.

Description : Even if among friends, how does joking about anything gay affect those directly or indirectly involved in the joke?

Last Answer : It really depends on the intent behind the joke - mean spirited or bigoted comments are usually very recognizable. Otherwise, I'm just a guilty as the next person for joking about stereotypes. It's definitely ... continue in the same vein, then that's not someone that I'm going to hang out with.

Description : What one factor distinguishes reports developed directly from those developed indirectly?

Last Answer : What is the answer ?

Description : Will not be directly or indirectly involved means?

Last Answer : Need answer

Description : Which of the following statements regarding the complement system are true? a. Complement activation yields products which are directly cytotoxic as well as products which act indirectly via activated ... and classical pathways converge proximal to generating the membrane attack complex (C5b-9)

Last Answer : Answer: a, d The complement system is composed of two different but linked sequences, the classic and alternative pathways. The pathways involve serum proteins that act to amplify the inflammatory-immune ... the C5 level proximal to generating the membrane attack complex (C5b-9) (Figure 6-3)

Description : The members of the Panchayat Samiti are - (1) nominated by the Block Development officer (2) nominated by the Zila Panchayat Chairman (3) directly elected by the people (4) indirectly electred by the members of the Village Panchayat

Last Answer : (3) directly elected by the people Explanation: The voters of the State Legislative Assembly of the region directly elect members of the Panchayat Samiti. All the Pradhans of the Gram Panchayat within ... of the Rajya Sabha residing in that block-all are ex-officio members of the Panchayat Samiti.

Description : The members of the Legislative Assembly are – (1) indirectly elected (2) directly elected by the people (3) partly elected and partly nominated by the Governor (4) mainly nominated

Last Answer : (2) directly elected by the people Explanation: Members of a Legislative Assembly (Vidhan Sabha) are direct representatives of the people of the particular state as they are directly elected by an electorate ... outlined in the Constitution of India is not more than 500 members and not less than 60.

Description : Which one of the following statements reflects the republic character of Indian democracy? (1) Written Constitution (2) No State religion (3) Devolution of power to local Government institutions (4) Elected President and directly or indirectly elected Parliament

Last Answer : (4) Elected President and directly or indirectly elected Parliament Explanation: Democracy is a system of government that allows the citizens to cast vote and elect a government of their choice. ... citizens the right to vote irrespective of their caste, colour, creed, religion and gender.

Description : A ‘republic’ is a state in which the Head of the State is - (1) nominated by the Prime Minister. (2) elected, directly or indirectly, by the people. (3) selected by the ruling party. (4) self-appointed.

Last Answer : (2) elected, directly or indirectly, by the people Explanation: A ‘republic’ is a state in which the head of the State is directly or indirectly or appointed by the people. Currently, 135 of their official names.

Description : Appropriate government means in relation to a public authority which is  established, constituted, owned, controlled or substantially financed by funds provided  directly or indirectly by a) The Central government b) The State government c) Union territory administration d) All the above

Last Answer : d) All the above

Description : Costs that are not directly related to the products or services of the project, but are indirectly related to performing the project. A. Intangible Costs B. Sunk Cost C. Tangible Costs D. Indirect Costs

Last Answer : D. Indirect Costs

Description : doesn’t need a linker to load it and is loaded _ a. Indirectly b. Directly c. Extending d. None of these

Last Answer : b. Directly

Description : Auditor’s responsibility for detecting noncompliance is limited to those: a. Direct-effect noncompliance. b. Material direct-effect noncompliance. c. Material indirect-effect noncompliance. d. All noncompliance since they affect the financial statements directly or indirectly

Last Answer : Material direct-effect noncompliance

Description : Mark the correct option a) No Govt. servant shall use his position or influence directly or indirectly to secure employment for any member of his family in any company. b) A Govt. servant shall, as soon ... firm, intimate such acceptance to the prescribed authority. c) Both A & B d) None of these

Last Answer : c) Both A & B