MCQOPTIONS
Saved Bookmarks
This section includes 6 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Multipartite viruses attack on _____________ |
| A. | files |
| B. | boot sector |
| C. | memory |
| D. | all of the mentioned |
| Answer» E. | |
| 2. |
File virus attaches itself to the _____________ |
| A. | source file |
| B. | object file |
| C. | executable file |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 3. |
The pattern that can be used to identify a virus is known as _____________ |
| A. | stealth |
| B. | virus signature |
| C. | armoured |
| D. | multipartite |
| Answer» C. armoured | |
| 4. |
The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________ |
| A. | logic bomb |
| B. | trap door |
| C. | code stacker |
| D. | none of the mentioned |
| Answer» B. trap door | |
| 5. |
The code segment that misuses its environment is called a _____________ |
| A. | internal thief |
| B. | trojan horse |
| C. | code stacker |
| D. | none of the mentioned |
| Answer» C. code stacker | |
| 6. |
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________ |
| A. | denial-of-service attack |
| B. | slow read attack |
| C. | spoofed attack |
| D. | starvation attack |
| Answer» B. slow read attack | |