Search your Topic HERE....

August 30, 2015

Computer Virus One-Liners for Competitive Exams

Leave a Comment

sponsored links

Hi i am Sarath Chandra...here i am sharing computer virus one liners.... Happy Reading :)
  • Any “malicious software” designed to secretly access your computer.--------Malware
  • Malware that copies itself and infects your computer and files------Virus
  • A virus is a man-made computer program that infects a file or program on our computers
  • VIRUS is actually an acronym for------- Vital Information Resource Under Siege!
  • A virus that can delete anti-virus software is called a-------retrovirus
  • The virus that spread in application software is called as-------Macro virus
  • A virus then monitors disk access and writes its code to boot sectors of media that is used on an infected computers-----boot virus
  • What is the first boot sector virus-----Brain
  • Another name for an antivirus is-----vaccine
  • The weakest link in any computer security system is----people
  • The most important computer-related loss is of-----data
  • What is the name of first computer virus------Creeper
  • A set of illicit instructions that passes itself on to other programs with which it comes in contact is called a-------virus
  • what is a type of malware that propagates by inserting a copy of itself into and becoming part of another program-------virus
  • The pattern that can be used to identify a virus is known as------virus signature
  • Malware that self-replicates and sends itself to other computers in your network.------Worm
  • The difference between a virus and a self-replicating program which is like a virus is that rather than
  • Creating copies of itself on only one system it propagate through computer ------worm
  • Which one of the following is a process that uses the spawn mechanism to revage the system performance-------worm
  • these are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage-----worms
  • Software that pretends to be useful but is really malware------Trojan horse
  • The code segment that misuses its environment is called a------trojan horse
  • What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications-----Trojan horses
  • It is a rogue program which tricks users---------Trojan horse
  • When cybercriminals try to get sensitive information from you, like credit card numbers and passwords------Phishing
  • any attempt by attackers to steal valuable information by pretending to be a trustworthy party------Phishing
  • This is a scammer’s tactic to trick victims into giving personal information that leads to identity theft-----Phishing
  • What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity------Phishing scams
  • targets specific people or departments------spear phishing
  • targets important people like CEOs---------whale phishing
  • Phishing via text messages is called-------SMiShing
  • the technique used to make the e-mail reader believe a fake website is authentic ------Spoofing
  • Impersonating a person, organization, agency, or server without permission-----Spoofing
  • When cybercriminals try to get into your computer by masquerading as trusted source(email spoofing, IP spoofing )------Spoofing
  • When website traffic is redirected to a bogus website, usually an ecommerce or banking site------Pharming
  • A means to point you to a malicious and illegitimate website by redirecting the legitimate URL-----Pharming
  • the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to
  • scam the user into surrendering private information that will be used for identity theft------Phishing
  • is possible from the legitimate website they intend to visit and lead them to malicious ones,
  • without the users' knowledge or consent----Pharming
  • Delayed payload of some viruses is also called as-----Bomb
  • During a particular data or time occurs virus called as------time bomb
  • The internal code of any software that will set of a malicious function when specified conditions are met, is called-------logic bomb
  • A security hole, inserted at programming time in the system for later use------Trap door
  • It is a hole in software left by designer------trap door
  • When someone breaks into a computer or network-------Hacking
  • A person who gains illegal access to a computer system is called a-------hacker
  • When one participant in communication pretends to be someone else------masquerading
  • When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called-----denial-of-service attack
  • What are common security threats-------File sharing and permission
  • File virus attaches itself to the------ executable file
  • Unsolicited Bulk Email-----Spam
  • unwanted junk mass e-mail----Spam
Download Pdf Files of Complete Computer Knowledge MCQs (19 files) from here
sponsored links

0 Responses:

Post a Comment

Related Posts Plugin for WordPress, Blogger...