adplus-dvertising
frame-decoration

Question

A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.

a.

polymorphic engine

b.

multiple engine

c.

mutual engine

d.

mutation engine

Answer: (d).mutation engine

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.

Similar Questions

Discover Related MCQs

Q. State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code.

Q. The type(s) of auto executing macros, in Microsoft word is/are

Q. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk.

Q. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks

Q. What is the name of the Act that governs internet usage in India?

Q. A worm is...

Q. You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?

Q. Why might someone break into (hack) your computer?

Q. If you receive an email claiming to need your username and/or password, what should you do?

Q. Both email attachments and downloaded files can spread malware.

Q. What is the best way to protect your information when you are away from your computer?

Q. What is a firewall?

Q. A strong password should contain:

Q. Social engineering is:

Q. What is “Trend Micro”?

Q. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

Q. The virus that spread in application software is called as

Q. How does a Le-Hard virus come into existence?

Q. What is the virus that spread in computer?

Q. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?