Question
a.
ii, i, iv and iii
b.
i, ii, iii, and iv
c.
ii, iii, iv and i
d.
i, iii, ii and iv
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
Similar Questions
Discover Related MCQs
Q. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
View solution
Q. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.
View solution
Q. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
View solution
Q. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.
View solution
Q. State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code.
View solution
Q. The type(s) of auto executing macros, in Microsoft word is/are
View solution
Q. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk.
View solution
Q. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks
View solution
Q. What is the name of the Act that governs internet usage in India?
View solution
Q. A worm is...
View solution
Q. You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?
View solution
Q. Why might someone break into (hack) your computer?
View solution
Q. If you receive an email claiming to need your username and/or password, what should you do?
View solution
Q. Both email attachments and downloaded files can spread malware.
View solution
Q. What is the best way to protect your information when you are away from your computer?
View solution
Q. What is a firewall?
View solution
Q. A strong password should contain:
View solution
Q. Social engineering is:
View solution
Q. What is “Trend Micro”?
View solution
Q. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!