Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Operations Management: Sustainability and Supply Chain Management
12th EditionBarry Render, Chuck Munson, Jay Heizer
1,698 solutions
Social Psychology
10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson
525 solutions
Anderson's Business Law and the Legal Environment, Comprehensive Volume
23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene
369 solutions
Applied Calculus for the Managerial, Life, and Social Sciences
8th EditionSoo Tan
6,275 solutions
D) Virus7. Which of the following malicious program do not replicate automatically?A) Trojan HorseB) VirusC) WormD) Zombie8................programs can be used to accomplish functions indirectly that an unauthorized user couldnot accomplish directly.A) ZombieB) WormC) Trojan HorsesD) Logic Bomb9. State whether true of false.i) A worm mails a copy of itself to other systems.ii) A worm executes a copy of itself on another system.A) True, FalseB) False, TrueC) True, TrueD) False, False10. A..............is a program that can infect other programs by modifying them, the modificationincludes a copy of the virus program, which can go on to infect other programs.A) WormB) VirusC) ZombieD)Trap doorsAnswers:11. B) Integrity12. A) Confidentiality13. C) i, ii, iii and v only14. D) Worm15. A) Trap doors16. C) Logic Bomb17. A) Trojan Horse18. C) Trojan Horses19. C) True, True20. B) VirusMCQ of Computer Security with answer set – 21..................are used in denial of service attacks, typically against targeted web sites.A) WormB) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i) Propagation phaseii) Dormant phaseiii) Execution phaseiv) Triggering phaseA) i, ii, iii, and ivB) i, iii, ii and ivC) ii, i, iv an iiiD) ii, iii, iv and i3. A....................attaches itself to executable files and replicates, when the infected program isexecuted, by finding other executable files to infect.A) Stealth virusB) Polymorphic VirusC) Parasitic Virus