adplus-dvertising
frame-decoration

Question

______________ are difficult to identify as they keep on changing their type and signature.

a.

Non-resident virus

b.

Boot Sector Virus

c.

Polymorphic Virus

d.

Multipartite Virus

Posted under Cyber Security

Answer: (c).Polymorphic Virus

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ______________ are difficult to identify as they keep on changing their type and signature.

Similar Questions

Discover Related MCQs

Q. ____________ deletes all the files that it infects.

Q. _____________ is also known as cavity virus.

Q. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?

Q. A ___________ is a small malicious program that runs hidden on infected system.

Q. ____________ works in background and steals sensitive data.

Q. By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.

Q. Trojan creators do not look for _______________

Q. Which of them is not a proper way of getting into the system?

Q. Which of the following port is not used by Trojans?

Q. Trojans do not do one of the following. What is that?

Q. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.

Q. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

Q. Trojans can not ______________

Q. A _______________ provides malicious users remote control over the targeted computer.

Q. _______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.

Q. ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.

Q. Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.

Q. ____________ work in background & keeps on downloading other malicious programs when the system is online.

Q. A/an ___________ is a program that steals your logins & passwords for instant messaging applications.

Q. _____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.