adplus-dvertising
frame-decoration

Question

Which of the following is/are threats for electronic payment systems?

a.

Computer virus

b.

Computer worms

c.

Trojan horse

d.

All of the above

Posted under IT Fundamentals

Answer: (d).All of the above

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is/are threats for electronic payment systems?

Similar Questions

Discover Related MCQs

Q. A virus that migrates freely within a large population of unauthorized email user is called a -------

Q. -------- are attempts by individuals to obtain confidential information from you to falsifying their identity.

Q. Authentication is

Q. A -------- is a computer program that can replicate itself and spread from one computer to another.

Q. Which of the following virus overtake computer system, when it boots and destroy information?

Q. Key logger is a

Q. To protect yourself from computer hacker, you should turn on a

Q. Firewalls are used to protect against --------

Q. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?

Q. -------- software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.

Q. Code red is a(n) ----------

Q. Which of the following would most likely not be a symptom of a virus?

Q. …………….. are used in denial of service attacks, typically against targeted web sites.

Q. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase

Q. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.

Q. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.

Q. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.

Q. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.

Q. State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code.

Q. The type(s) of auto executing macros, in Microsoft word is/are