adplus-dvertising
frame-decoration

Question

Which of them is not an ideal way of spreading the virus?

a.

Infected website

b.

Emails

c.

Official Antivirus CDs

d.

USBs

Posted under Cyber Security

Answer: (c).Official Antivirus CDs

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of them is not an ideal way of spreading the virus?

Similar Questions

Discover Related MCQs

Q. In which year Apple II virus came into existence?

Q. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.

Q. The virus hides itself from getting detected by ______ different ways.

Q. _______________ infects the master boot record and it is challenging and a complex task to remove this virus.

Q. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.

Q. Direct Action Virus is also known as ___________

Q. ______________ infects the executables as well as the boot sectors.

Q. ______________ are difficult to identify as they keep on changing their type and signature.

Q. ____________ deletes all the files that it infects.

Q. _____________ is also known as cavity virus.

Q. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?

Q. A ___________ is a small malicious program that runs hidden on infected system.

Q. ____________ works in background and steals sensitive data.

Q. By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.

Q. Trojan creators do not look for _______________

Q. Which of them is not a proper way of getting into the system?

Q. Which of the following port is not used by Trojans?

Q. Trojans do not do one of the following. What is that?

Q. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.

Q. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.