Question
a.
They are encrypted
b.
They act with special permissions
c.
They modify themselves
d.
None of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. How do viruses avoid basic pattern match of antivirus ?
Similar Questions
Discover Related MCQs
Q. How does an antivirus of today identify viruses ?
View solution
Q. What is known as sandbox ?
View solution
Q. What is are two safe computing practices ?
View solution
Q. What are the different ways to intrude ?
View solution
Q. What are major components of intrusion detection system ?
View solution
Q. What are the different ways to classify an IDS ?
View solution
Q. What are characteristics of anomaly based IDS ?
View solution
Q. What is major drawback of anomaly detection IDS ?
View solution
Q. What are characteristics of signature based IDS ?
View solution
Q. What are drawbacks of signature based IDS ?
View solution
Q. What are characteristics of Host based IDS ?
View solution
Q. What are drawbacks of the host based IDS ?
View solution
Q. What are strengths of the host based IDS ?
View solution
Q. What are characteristics of stack based IDS ?
View solution
Q. What are characteristics of Network based IDS ?
View solution
Q. What are strengths of Network based IDS ?
View solution
Q. What is preferred way of encryption ?
View solution
Q. What is not a role of encryption ?
View solution
Q. What is cipher-block chaining ?
View solution
Q. What is not an encryption standard ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!