hamburger menu
All Coursesall course arrow
adda247
reward-icon
adda247
    arrow
    arrow
    arrow
    Match List I with List II.List-I(Malware Type)List-II(Definition)A.Polymorphic VirusI.A seemingly useful program that contains hidden harmful progra
    Question

    Match List I with List II.

    List-I
    (Malware Type)

    List-II
    (Definition)

    A.

    Polymorphic Virus

    I.

    A seemingly useful program that contains hidden harmful program code

    B.

    Metamorphic Virus

    II.

    Changes its signature with each copy made during replication

    C.

    Trojan Horse

    III.

    A malware that spreads copies of itself through a network without user interaction

    D.

    Worm

    IV.

    Completely rewrites itself each time it is replicated, sometimes changing its behaviour

    Choose the correct option from the given below options:

    A.

    A-II, B-I, C-IV, D-III

    B.

    A-III, B-IV, C-I, D-II

    C.

    A-II, B-IV, C-I, D-III

    D.

    A-I, B-III, C-IV, D-II

    Correct option is C

    A. Polymorphic Virus: It changes its signature with each copy made during replication (II), making it harder for antivirus programs to detect.
    B. Metamorphic Virus: It completely rewrites itself each time it is replicated, sometimes changing its behaviour (IV). This is a more sophisticated virus compared to polymorphic viruses.
    C. Trojan Horse: It appears to be a seemingly useful program that contains hidden harmful program code (I). It tricks users into running it, after which it executes malicious actions.
    D. Worm: A wormspreads copies of itself through a network without user interaction (III). It does this autonomously and can cause widespread damage to networks.
    Information Booster:
    1. Polymorphic Virus: This virus type alters its code to avoid detection by antivirus programs. Each new copy of the virus behaves differently, making it difficult to detect based on known signatures.
    2. Metamorphic Virus: Unlike polymorphic viruses, metamorphic viruses completely change their entire code on every replication, effectively avoiding detection by antivirus software.
    3. Trojan Horse: This malware is disguised as a legitimate or useful software program. It performs harmful actions once executed, such as stealing data, corrupting files, or opening backdoors to systems.
    4. Worm: Worms exploit network vulnerabilities to propagate across systems. They do not require user interaction, unlike viruses, and can spread widely in a short period, causing network congestion and security issues.

    Free Tests

    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English
    Free
    Must Attempt

    UGC NET Paper 1 Mock Test 1

    languageIcon English
    • pdpQsnIcon50 Questions
    • pdpsheetsIcon100 Marks
    • timerIcon60 Mins
    languageIcon English
    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English

    Similar Questions

    test-prime-package

    Access ‘UGC NET December’ Mock Tests with

    • 60000+ Mocks and Previous Year Papers
    • Unlimited Re-Attempts
    • Personalised Report Card
    • 500% Refund on Final Selection
    • Largest Community
    students-icon
    354k+ students have already unlocked exclusive benefits with Test Prime!
    Our Plans
    Monthsup-arrow