Question
a.
A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation
b.
A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred
c.
A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
d.
All of the above
Posted under UGC NET computer science question paper Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. A Trojan horse is
Similar Questions
Discover Related MCQs
Q. In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text
View solution
Q. Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE
View solution
Q. Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions?
View solution
Q. Match the following port numbers with their uses :
(a) 23 (i) World wide web
(b) 25 (ii) Remote Login
(c) 80 (iii) USENET news
(d) 119 (iv) Email
code (a) (b) (c) (d)
View solution
Q. Which of the following is not associated with the session layer ?
View solution
Q. What is the size of the 'total length' field in IPv4 datagram ?
View solution
Q. Which of the following is/are restriction(s) in classless addressing ?
View solution
Q. The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called :
View solution
Q. Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender?
View solution
Q. Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?
View solution
Q. Which are the two modes of IP security?
View solution
Q. A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :
View solution
Q. Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?
View solution
Q. The maximum payload of a TCP segment is :
View solution
Q. In a binary Hamming Code the number of check digits is r then number of message digits is equal to :
View solution
Q. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps?
View solution
Q. Match the following cryptographic algorithms with their design issues:
List-I List-II
a. DES i. Message Digest
b. AES ii. Public Key
c. RSA iii. 56-bit key
d. SHA-1 iv. 128-bit key
Codes:
a b c d
View solution
Q. Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.
View solution
Q. A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?
View solution
Q. Which of the following is used in the options field of IPv4 ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!