hamburger menu
All Coursesall course arrow
adda247
reward-icon
adda247
    arrow
    arrow
    arrow
    Match List - I with List - II.List - I(Computer attack/cyber crime)List - II(Definition)A.WormI. Misdirecting users to a fraudulent website witho
    Question

    Match List - I with List - II.

    List - I
    (Computer attack/cyber crime)

    List - II
    (Definition)

    A.
    Worm
    I. 
    Misdirecting users to a fraudulent website without their knowledge or consent.
    B. 
    Bot
    II.
    A malware that replicates itself in order to spread to other computers across the network.
    C. 
    Denial-of-Service
    III. 
    Flooding sites with useless traffic to overwhelm a network.
    D. 
    Pharming
    IV. 
    A malware that responds to external commands sent by an attacker.

    Choose the correct answer from the options given below:

    A.

    (A)-(II), (B)-(IV), (C)-(III), (D)-(I)

    B.

    (A)-(I), (B)-(III), (C)-(IV), (D)-(II)

    C.

    (A)-(III), (B)-(II), (C)-(I), (D)-(IV)

    D.

    (A)-(IV), (B)-(I), (C)-(II), (D)-(III)

    Correct option is A

    (A) Worm: A worm is a type of malware that replicates itself in order to spread to other computers across a network. This matches definition (II).
    (B) Bot: A bot is malware that responds to external commands sent by an attacker, which matches definition (IV).
    (C) Denial-of-Service: A Denial-of-Service attack floods a site with useless traffic in order to overwhelm the network, which corresponds to definition (III).
    (D) Pharming: Pharming misdirects users to a fraudulent website without their knowledge or consent, matching definition (I).
    Information Booster:
    1. Worms are self-replicating and can spread across networks, exploiting security vulnerabilities.
    2. Bots are often controlled remotely by hackers and can be used in large-scale cyber-attacks, such as Distributed Denial of Service (DDoS).
    3. Denial-of-Service (DoS) attacks aim to make a website or online service unavailable by overwhelming it with excessive traffic.
    4. Pharming involves redirecting users from legitimate websites to fake ones, usually for stealing sensitive data like passwords or banking information.
    5. Worms are different from viruses in that they do not require a host program to spread.
    6. Bots can form a botnet, a network of infected computers controlled by attackers to carry out cyber-attacks.

    Free Tests

    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English
    Free
    Must Attempt

    UGC NET Paper 1 Mock Test 1

    languageIcon English
    • pdpQsnIcon50 Questions
    • pdpsheetsIcon100 Marks
    • timerIcon60 Mins
    languageIcon English
    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English

    Similar Questions

    test-prime-package

    Access ‘UGC NET December’ Mock Tests with

    • 60000+ Mocks and Previous Year Papers
    • Unlimited Re-Attempts
    • Personalised Report Card
    • 500% Refund on Final Selection
    • Largest Community
    students-icon
    354k+ students have already unlocked exclusive benefits with Test Prime!
    Our Plans
    Monthsup-arrow