250+ Understanding Attack Vectors part-2

Que.______________ infects the executables as well as the boot sectors.
a. Non-resident virus
b. Boot Sector Virus
c. Polymorphic Virus
d. Multipartite Virus
Que.______________ are difficult to identify as they keep on changing their type and signature.
a. Non-resident virus
b. Boot Sector Virus
c. Polymorphic Virus
d. Multipartite Virus
Que.____________ deletes all the files that it infects.
a. Non-resident virus
b. Overwrite Virus
c. Polymorphic Virus
d. Multipartite Virus
Que._____________ is also known as cavity virus.
a. Non-resident virus
b. Overwrite Virus
c. Polymorphic Virus
d. Space-filler Virus
Que.Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
a. Research purpose
b. Pranks
c. Identity theft
d. Protection
Que.A ___________ is a small malicious program that runs hidden on infected system.
a. Virus
b. Trojan
c. Shareware
d. Adware
Que.____________ works in background and steals sensitive data.
a. Virus
b. Shareware
c. Trojan
d. Adware
Que.By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.
a. Trojan
b. Virus
c. Antivirus
d. Anti-malware
Que.Trojan creators do not look for _______________
a. Credit card information
b. Confidential data
c. Important documents
d. Securing systems with such programs
Que.Which of them is not a proper way of getting into the system?
a. IM
b. Attachments
c. Official product sites
d. Un-trusted sites, freeware and pirated software