Medical Factors Which make it The most effective just by Sejal Kakadiya Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients. How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector just by Steven Orange A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...
1. …………….. are used in denial of service attacks, typically against targeted web sites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse
2. Select the correct order for the different phases of virus execution.
i) Propagation phase ii) Dormant phase
iii) Execution phase iv) Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i
3. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
4. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
5. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
A) Boot Sector Virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
6. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.
A) mutual engine
B) mutation engine
C) multiple engine
D) polymorphic engine
7. State whether the following statement is true.
i) A macro virus is platform independent.
ii) Macro viruses infect documents, not executable portions of code.
A) i-only
B) ii-only
C) Both i and ii
D) Non i and ii
8. The type(s) of auto executing macros, in Microsoft word is/are
A) Auto execute
B) Auto macro
C) Command macro
D) All of the above
9. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk.
A) Dormant phase
B) Propagation phase
C) Triggering phase
D) Execution phase
10. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors
Answers:
1. B) Zombie 2. C) ii, i, iv an iii 3. C) Parasitic Virus 4. A) Stealth virus 5. B) Polymorphic Virus | 6. B) mutation engine 7. C) Both i and ii 8. D) All of the above 9. B) Propagation phase 10. B) Zombie |
You may also wanted to view the following related posts
- Solved MCQ of Computer Security set -1
- Solved MCQ of Operating System Principles set-2
- Solved MCQ of Operating System Theory set-3
- MCQ of Operating System with answer set-4
- Solved MCQ of Operating System Set-5
You can view the following other posts
- Solved MCQ of Database Management System (DBMS) Set - 3
- Solved MCQ of System Analysis and Design Set-3
- Solved MCQ of Data Structure Set - 2
- Solved MCQ of Java for Java Proficiency test set-3
- MCQ of C++ with answer Set-2
- MCQ of Computer Networking with answer set-4
Comments
Post a Comment