Which of the following attaches itself to executable files and replicates?
- (A) Small virus
- (B) Parasitic Virus
- (C) Parasitic worm
- (D) Large Virus
- (B) Parasitic Virus
Which of the following is a form of virus unambiguously planned to hide itself from exposing by antivirus software?
- (A) Stealth virus
- (B) Poly phase Virus
- (C) Small worm
- (D) Large Virus
- (A) Stealth virus
What of the given copies itself during replication but have definitely different bit patterns?
- (A) Small Virus
- (B) Stealth Virus
- (C) Polymorphic Virus
- (D) Large Virus
- (C) Polymorphic Virus
A ________, a portion of the Polymorphic virus creates a random encryption key to hide the remainder of the virus.
- (A) mutual virus
- (B) mutation engine
- (C) multiple phase engine
- (D) polymorphic engine
- (B) mutation engine
The following statement is true or false:
- i) A macro virus is autonomous.
- ii) Macro viruses infects only documents
- (A) i-only
- (B) ii-only
- (C) Both A & B
- (D) None of these
- (C) Both A & B
In Microsoft word the type of auto executing macros is/are:
- (A) Auto execute
- (B) Auto macro
- (C) Command macro
- (D) All of the above
- (D) All of the above
In which of the given the virus places an copy of itself into other programs or on disk?
- (A) Generation phase
- (B) Propagation phase
- (C) Reproducing phase
- (D) Changing phase
- (B) Propagation phase
A uses a computer to launch attacks after secretly takes over another Internet-attached computer:
- (A) Zombie
- (B) Worm
- (C) Virus
- (D) Trojan
- (A) Zombie
A computer system assets can be modified only by authorized parities. This is the definition of:
- (A) Confidentiality
- (B) Integrity
- (D) Security
- (D) Authentication
- (B) Integrity
________ means that the information in a computer system only be available for reading by allowed parities.
- (A) Confidentiality
- (B) Integrity of data
- (C) Availability
- (D) Security
- (A) Confidentiality