Computer Security

Which of the following attaches itself to executable files and replicates?

  • (A) Small virus
  • (B) Parasitic Virus
  • (C) Parasitic worm
  • (D) Large Virus
Check Answer
  • (B) Parasitic Virus

Which of the following is a form of virus unambiguously planned to hide itself from exposing by antivirus software?

  • (A) Stealth virus
  • (B) Poly phase Virus
  • (C) Small worm
  • (D) Large Virus
Check Answer
  • (A) Stealth virus

What of the given copies itself during replication but have definitely different bit patterns?

  • (A) Small Virus
  • (B) Stealth Virus
  • (C) Polymorphic Virus
  • (D) Large Virus
Check Answer
  • (C) Polymorphic Virus

A ________, a portion of the Polymorphic virus creates a random encryption key to hide the remainder of the virus.

  • (A) mutual virus
  • (B) mutation engine
  • (C) multiple phase engine
  • (D) polymorphic engine
Check Answer
  • (B) mutation engine

The following statement is true or false:

  • i) A macro virus is autonomous.
  • ii) Macro viruses infects only documents
  • (A) i-only
  • (B) ii-only
  • (C) Both A & B
  • (D) None of these
Check Answer
  • (C) Both A & B

In Microsoft word the type of auto executing macros is/are:

  • (A) Auto execute
  • (B) Auto macro
  • (C) Command macro
  • (D) All of the above
Check Answer
  • (D) All of the above

In which of the given the virus places an copy of itself into other programs or on disk?

  • (A) Generation phase
  • (B) Propagation phase
  • (C) Reproducing phase
  • (D) Changing phase
Check Answer
  • (B) Propagation phase

A uses a computer to launch attacks after secretly takes over another Internet-attached computer:

  • (A) Zombie
  • (B) Worm
  • (C) Virus
  • (D) Trojan
Check Answer
  • (A) Zombie

A computer system assets can be modified only by authorized parities. This is the definition of:

  • (A) Confidentiality
  • (B) Integrity
  • (D) Security
  • (D) Authentication
Check Answer
  • (B) Integrity

________ means that the information in a computer system only be available for reading by allowed parities.

  • (A) Confidentiality
  • (B) Integrity of data
  • (C) Availability
  • (D) Security
Check Answer
  • (A) Confidentiality

You cannot copy content of this page

Scroll to Top