What is software you don't want hidden inside software you do want?
a. Adware
b. Trojan‐horse software
c. Spyware
d. All of the above

1 Answer

Answer :

d. All of the above

Related questions

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above

Last Answer : a. firewall

Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware

Last Answer : a. Key logger software

Description : Free adware/spyware/virus software for windows?

Last Answer : answer:ad-aware is good. spybot search & destroy too… A-squared has a free version. If you are computer savvy than I recommend HijackThis —— All of these can also be found at Major Geeks

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : Which is the best anti-adware spyware malware program? Going nuts.

Last Answer : answer:When you have something really nasty on your computer, I use Spybot Search and Destroy, it is freeware but works really well. The only drawback is scans take a really long time. ... and replaced it with this. http://www.microsoft.com/nz/digitallife/security/microsoft-security-essentials.mspx#

Description : PC help! Anti-adware/spyware solutions.

Last Answer : You need a spyware remover that doesn’t suck. Get Spybot Search and Destroy as well as Ad-Aware, both are free and you can find the links through Google.

Description : Adware is some times called ________ A. Shareware B. Abandonware C. Donationware D. Spyware

Last Answer : D. Spyware

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Key loggers are form of A. Spyware B. Shoulder surfing C. Trojan D. Social engineering

Last Answer : A. Spyware

Description : What’s the difference between a virus, a worm, a Trojan and spyware?

Last Answer : All these types of malicious software, or malware, pose a serious threat to your computer and data. 4 A virus invades a computer and copies, deletes or damages data. 4 A worm is a ... numerous pop-up ads, and may steal your personal information or change your computer settings without your knowing.

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : Which of the following can be used to help identify people in a crowd? a. Biochip b. Implant chip c. Facial recognition software d. Vision chip

Last Answer : c. Facial recognition software

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software

Last Answer : d. Screen capture software

Description : When you purchase copyrighted software, what actually are you paying for? a. The cost of the CDs, manuals, and development of the software b. The cost of the CDs, manuals, and a share of the cost of the software development c. A share of the cost of software development d. All of the above

Last Answer : d. All of the above

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : c. Firewall

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : An analogy similar to Trojan Horse that describes letting in an attractive enemy?

Last Answer : wolf in sheep’s clothing ? or is that about as subtle as trojan horse ?

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : What is Trojan Horse ?

Last Answer : Trojan horses are a type of malware. Which, like a computer virus, enters and harms the computer in the guise of good software.

Description : I know it's a pighouse that gets into the PC, but why is it a Trojan and why a horse?

Last Answer : Hmmm ... Read the Iliad - and it will be clear to you ...: o Today, people read very little ...: D

Description : What city was the Trojan horse left?

Last Answer : Need answer

Description : Never Accept a Trojan Horse?

Last Answer : The original Trojan horse was sent as a gift and when opened,revealed hundreds of armed soldiers who wreaked havoc. Today'sTrojan horses are computer malware that appear to be usefulsoftware, ... a virus.Viruses, by their very definition, replicate themselves and attachto legitimate files and progr

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : a) Trap doors

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above