CSE MCQs :: Malware
- Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
- The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
- What is an antivirus?
- What is Spyware?
- What are the uses of Malware?
- What is Trojan Horse?
- Which of the following is a program capable of continually replicating with little or no user intervention?
- What are the examples of Malware Spreads?
A.
Spyware is a type of malware installed on computers that collects information about users without their knowledge
|
B.
The presence of spyware is typically hidden from the user and can be difficult to detect
|
C.
Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else
|
D.
All of the above
|
A.
Many early infectious programs, including the first Internet Worm, were written as experiments or pranks
|
B.
Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others
|
C.
Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general
|
D.
All of these
|
A.
A Trojan Horse program has the appearance of having a useful and desired function
|
B.
A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer
|
C.
A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort
|
D.
All of the above
|