Computer Virus One-Liners for Competitive Exams

August 30, 2015    

sponsored links

Hi i am Sarath Chandra...here i am sharing computer virus one liners.... Happy Reading :)
  • Any “malicious software” designed to secretly access your computer.--------Malware
  • Malware that copies itself and infects your computer and files------Virus
  • A virus is a man-made computer program that infects a file or program on our computers
  • VIRUS is actually an acronym for------- Vital Information Resource Under Siege!
  • A virus that can delete anti-virus software is called a-------retrovirus
  • The virus that spread in application software is called as-------Macro virus
  • A virus then monitors disk access and writes its code to boot sectors of media that is used on an infected computers-----boot virus
  • What is the first boot sector virus-----Brain
  • Another name for an antivirus is-----vaccine
  • The weakest link in any computer security system is----people
  • The most important computer-related loss is of-----data
  • What is the name of first computer virus------Creeper
  • A set of illicit instructions that passes itself on to other programs with which it comes in contact is called a-------virus
  • what is a type of malware that propagates by inserting a copy of itself into and becoming part of another program-------virus
  • The pattern that can be used to identify a virus is known as------virus signature
  • Malware that self-replicates and sends itself to other computers in your network.------Worm
  • The difference between a virus and a self-replicating program which is like a virus is that rather than
  • Creating copies of itself on only one system it propagate through computer ------worm
  • Which one of the following is a process that uses the spawn mechanism to revage the system performance-------worm
  • these are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage-----worms
  • Software that pretends to be useful but is really malware------Trojan horse
  • The code segment that misuses its environment is called a------trojan horse
  • What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications-----Trojan horses
  • It is a rogue program which tricks users---------Trojan horse
  • When cybercriminals try to get sensitive information from you, like credit card numbers and passwords------Phishing
  • any attempt by attackers to steal valuable information by pretending to be a trustworthy party------Phishing
  • This is a scammer’s tactic to trick victims into giving personal information that leads to identity theft-----Phishing
  • What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity------Phishing scams
  • targets specific people or departments------spear phishing
  • targets important people like CEOs---------whale phishing
  • Phishing via text messages is called-------SMiShing
  • the technique used to make the e-mail reader believe a fake website is authentic ------Spoofing
  • Impersonating a person, organization, agency, or server without permission-----Spoofing
  • When cybercriminals try to get into your computer by masquerading as trusted source(email spoofing, IP spoofing )------Spoofing
  • When website traffic is redirected to a bogus website, usually an ecommerce or banking site------Pharming
  • A means to point you to a malicious and illegitimate website by redirecting the legitimate URL-----Pharming
  • the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to
  • scam the user into surrendering private information that will be used for identity theft------Phishing
  • is possible from the legitimate website they intend to visit and lead them to malicious ones,
  • without the users' knowledge or consent----Pharming
  • Delayed payload of some viruses is also called as-----Bomb
  • During a particular data or time occurs virus called as------time bomb
  • The internal code of any software that will set of a malicious function when specified conditions are met, is called-------logic bomb
  • A security hole, inserted at programming time in the system for later use------Trap door
  • It is a hole in software left by designer------trap door
  • When someone breaks into a computer or network-------Hacking
  • A person who gains illegal access to a computer system is called a-------hacker
  • When one participant in communication pretends to be someone else------masquerading
  • When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called-----denial-of-service attack
  • What are common security threats-------File sharing and permission
  • File virus attaches itself to the------ executable file
  • Unsolicited Bulk Email-----Spam
  • unwanted junk mass e-mail----Spam
Download Pdf Files of Complete Computer Knowledge MCQs (19 files) from here
sponsored links

This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.

Computer Virus One-Liners for Competitive Exams 4.5 5 Yateendra sahu August 30, 2015 sponsored links Hi i am Sarath Chandra ...here i am sharing computer virus one liners.... Happy Reading :) Any “malicious software” de...


Related Post:

  • Vidharbha Konkan Gramin Bank Recruitment 2015
    sponsored links Friends, the Vidharbha Konkan Gramin Bank is recruiting Officers in Junior Management (Scale- I) and Office Assistant (Multipurpose) for the year 2015. Those aspirants who have appeared and cleared the IBPS RRB CWE III are eligible… Read More
  • 11th August 2015 - Important Current Affairs updates
    sponsored links International Affairs Prime Minister ‎Narendra Modi‬ will pay a two-day visit to ‎United Arab Emirates‬ beginning 16th of this month. This is the first visit by an Indian Prime Minister to the Gulf nation in 34 years. Mr Modi wi… Read More
  • General & Banking Awareness Quiz for IBPS Bank Exams - Set 9
    sponsored links Hi friends,  I am Shravan again. Here I am sharing the Set 9 questions of General and Banking Awareness taken from News Papers. Happy Reading :) How much of Capital would be infused in Public Sector banks by Union Government… Read More
  • General Awareness Quiz for IBPS Bank Exams - Set 8
    sponsored links Hi friends,  I am Shravan again. Here I am sharing the Set 8 questions of General and Banking Awareness taken from News Papers. Happy Reading :) This entry passed through the Full-Text RSS service - if this is your content an… Read More
  • OICL Assistants 2015 Online Exam Call Letters out
    sponsored links Friends, the Oriental Insurance Company Ltd (OICL) has released Call Letters for it's OICL Assistants Online Exam 2015. Earlier, the OICL has invited online applications for the recruitment of 606 (SC-94, ST-43, OBC-122, UR-347, PW… Read More
Load comments

No comments:

Post a Comment