arrow
arrow
arrow
Match List I with List II.List-I(Malware Type)List-II(Definition)A.Polymorphic VirusI.A seemingly useful program that contains hidden harmful progra
Question

Match List I with List II.

List-I
(Malware Type)

List-II
(Definition)

A.

Polymorphic Virus

I.

A seemingly useful program that contains hidden harmful program code

B.

Metamorphic Virus

II.

Changes its signature with each copy made during replication

C.

Trojan Horse

III.

A malware that spreads copies of itself through a network without user interaction

D.

Worm

IV.

Completely rewrites itself each time it is replicated, sometimes changing its behaviour

Choose the correct option from the given below options:

A.

A-II, B-I, C-IV, D-III

B.

A-III, B-IV, C-I, D-II

C.

A-II, B-IV, C-I, D-III

D.

A-I, B-III, C-IV, D-II

Correct option is C

A. Polymorphic Virus: It changes its signature with each copy made during replication (II), making it harder for antivirus programs to detect.
B. Metamorphic Virus: It completely rewrites itself each time it is replicated, sometimes changing its behaviour (IV). This is a more sophisticated virus compared to polymorphic viruses.
C. Trojan Horse: It appears to be a seemingly useful program that contains hidden harmful program code (I). It tricks users into running it, after which it executes malicious actions.
D. Worm: A wormspreads copies of itself through a network without user interaction (III). It does this autonomously and can cause widespread damage to networks.
Information Booster:
  1. Polymorphic Virus: This virus type alters its code to avoid detection by antivirus programs. Each new copy of the virus behaves differently, making it difficult to detect based on known signatures.
  2. Metamorphic Virus: Unlike polymorphic viruses, metamorphic viruses completely change their entire code on every replication, effectively avoiding detection by antivirus software.
  3. Trojan Horse: This malware is disguised as a legitimate or useful software program. It performs harmful actions once executed, such as stealing data, corrupting files, or opening backdoors to systems.
  4. Worm: Worms exploit network vulnerabilities to propagate across systems. They do not require user interaction, unlike viruses, and can spread widely in a short period, causing network congestion and security issues.

Free Tests

Free
Must Attempt

Basics of Education: Pedagogy, Andragogy, and Hutagogy

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon12 Mins
languageIcon English
Free
Must Attempt

UGC NET Paper 1 Mock Test 1

languageIcon English
  • pdpQsnIcon50 Questions
  • pdpsheetsIcon100 Marks
  • timerIcon60 Mins
languageIcon English
Free
Must Attempt

Basics of Education: Pedagogy, Andragogy, and Hutagogy

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon12 Mins
languageIcon English

Similar Questions

test-prime-package

Access ‘UGC NET December’ Mock Tests with

  • 60000+ Mocks and Previous Year Papers
  • Unlimited Re-Attempts
  • Personalised Report Card
  • 500% Refund on Final Selection
  • Largest Community
students-icon
368k+ students have already unlocked exclusive benefits with Test Prime!
Our Plans
Monthsup-arrow