Question
a.
Infected website
b.
Emails
c.
Official Antivirus CDs
d.
USBs
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of them is not an ideal way of spreading the virus?
Similar Questions
Discover Related MCQs
Q. In which year Apple II virus came into existence?
View solution
Q. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.
View solution
Q. The virus hides itself from getting detected by ______ different ways.
View solution
Q. _______________ infects the master boot record and it is challenging and a complex task to remove this virus.
View solution
Q. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.
View solution
Q. Direct Action Virus is also known as ___________
View solution
Q. ______________ infects the executables as well as the boot sectors.
View solution
Q. ______________ are difficult to identify as they keep on changing their type and signature.
View solution
Q. ____________ deletes all the files that it infects.
View solution
Q. _____________ is also known as cavity virus.
View solution
Q. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
View solution
Q. A ___________ is a small malicious program that runs hidden on infected system.
View solution
Q. ____________ works in background and steals sensitive data.
View solution
Q. By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.
View solution
Q. Trojan creators do not look for _______________
View solution
Q. Which of them is not a proper way of getting into the system?
View solution
Q. Which of the following port is not used by Trojans?
View solution
Q. Trojans do not do one of the following. What is that?
View solution
Q. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.
View solution
Q. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!