Question
a.
Virus
b.
c.
Portals
d.
Spam
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. -------- are often delivered to a PC through an email attachment and are often designed to do harm.
Similar Questions
Discover Related MCQs
Q. The altering of data so that it is not usable unless the changes are undone is
View solution
Q. VIRUS stands for
View solution
Q. What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
View solution
Q. Which of the following is/are threats for electronic payment systems?
View solution
Q. A virus that migrates freely within a large population of unauthorized email user is called a -------
View solution
Q. -------- are attempts by individuals to obtain confidential information from you to falsifying their identity.
View solution
Q. Authentication is
View solution
Q. A -------- is a computer program that can replicate itself and spread from one computer to another.
View solution
Q. Which of the following virus overtake computer system, when it boots and destroy information?
View solution
Q. Key logger is a
View solution
Q. To protect yourself from computer hacker, you should turn on a
View solution
Q. Firewalls are used to protect against --------
View solution
Q. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
View solution
Q. -------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.
View solution
Q. Code red is a(n) ----------
View solution
Q. Which of the following would most likely not be a symptom of a virus?
View solution
Q. …………….. are used in denial of service attacks, typically against targeted web sites.
View solution
Q. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
View solution
Q. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
View solution
Q. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!