Question
a.
They are encrypted
b.
They act with special permissions
c.
They modify themselves
d.
None of the mentioned
Posted under Protection and Security Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. How do viruses avoid basic pattern match of antivirus ?
Similar Questions
Discover Related MCQs
Q. How does an antivirus of today identify viruses ?
View solution
Q. What is known as sandbox ?
View solution
Q. What is are two safe computing practices ?
View solution
Q. What are the different ways to intrude ?
View solution
Q. What are major components of intrusion detection system ?
View solution
Q. What are the different ways to classify an IDS ?
View solution
Q. What are characteristics of anomaly based IDS ?
View solution
Q. What is major drawback of anomaly detection IDS ?
View solution
Q. What are characteristics of signature based IDS ?
View solution
Q. What are drawbacks of signature based IDS ?
View solution
Q. What are characteristics of Host based IDS ?
View solution
Q. What are drawbacks of the host based IDS ?
View solution
Q. What are strengths of the host based IDS ?
View solution
Q. What are characteristics of stack based IDS ?
View solution
Q. What are characteristics of Network based IDS ?
View solution
Q. What are strengths of Network based IDS ?
View solution
Q. What is preferred way of encryption ?
View solution
Q. What is not a role of encryption ?
View solution
Q. What is cipher-block chaining ?
View solution
Q. What is not an encryption standard ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!