sponsored links
Hi i am Sarath Chandra...here i am sharing computer virus one liners.... Happy Reading :)
- Any “malicious software” designed to secretly access your computer.--------Malware
- Malware that copies itself and infects your computer and files------Virus
- A virus is a man-made computer program that infects a file or program on our computers
- VIRUS is actually an acronym for------- Vital Information Resource Under Siege!
- A virus that can delete anti-virus software is called a-------retrovirus
- The virus that spread in application software is called as-------Macro virus
- A virus then monitors disk access and writes its code to boot sectors of media that is used on an infected computers-----boot virus
- What is the first boot sector virus-----Brain
- Another name for an antivirus is-----vaccine
- The weakest link in any computer security system is----people
- The most important computer-related loss is of-----data
- What is the name of first computer virus------Creeper
- A set of illicit instructions that passes itself on to other programs with which it comes in contact is called a-------virus
- what is a type of malware that propagates by inserting a copy of itself into and becoming part of another program-------virus
- The pattern that can be used to identify a virus is known as------virus signature
- Malware that self-replicates and sends itself to other computers in your network.------Worm
- The difference between a virus and a self-replicating program which is like a virus is that rather than
- Creating copies of itself on only one system it propagate through computer ------worm
- Which one of the following is a process that uses the spawn mechanism to revage the system performance-------worm
- these are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage-----worms
- Software that pretends to be useful but is really malware------Trojan horse
- The code segment that misuses its environment is called a------trojan horse
- What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications-----Trojan horses
- It is a rogue program which tricks users---------Trojan horse
- When cybercriminals try to get sensitive information from you, like credit card numbers and passwords------Phishing
- any attempt by attackers to steal valuable information by pretending to be a trustworthy party------Phishing
- This is a scammer’s tactic to trick victims into giving personal information that leads to identity theft-----Phishing
- What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity------Phishing scams
- targets specific people or departments------spear phishing
- targets important people like CEOs---------whale phishing
- Phishing via text messages is called-------SMiShing
- the technique used to make the e-mail reader believe a fake website is authentic ------Spoofing
- Impersonating a person, organization, agency, or server without permission-----Spoofing
- When cybercriminals try to get into your computer by masquerading as trusted source(email spoofing, IP spoofing )------Spoofing
- When website traffic is redirected to a bogus website, usually an ecommerce or banking site------Pharming
- A means to point you to a malicious and illegitimate website by redirecting the legitimate URL-----Pharming
- the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to
- scam the user into surrendering private information that will be used for identity theft------Phishing
- is possible from the legitimate website they intend to visit and lead them to malicious ones,
- without the users' knowledge or consent----Pharming
- Delayed payload of some viruses is also called as-----Bomb
- During a particular data or time occurs virus called as------time bomb
- The internal code of any software that will set of a malicious function when specified conditions are met, is called-------logic bomb
- A security hole, inserted at programming time in the system for later use------Trap door
- It is a hole in software left by designer------trap door
- When someone breaks into a computer or network-------Hacking
- A person who gains illegal access to a computer system is called a-------hacker
- When one participant in communication pretends to be someone else------masquerading
- When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called-----denial-of-service attack
- What are common security threats-------File sharing and permission
- File virus attaches itself to the------ executable file
- Unsolicited Bulk Email-----Spam
- unwanted junk mass e-mail----Spam
sponsored links
This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.
No comments:
Post a Comment