arrow
arrow
arrow
Match the List – I with List – II.List – I (Malware types)List – II  (Characteristics) A. Trapdoor I. Produces varying but operationally equivale
Question

Match the columns.

Match the List – I with List – II.

List – I (Malware types)
List – II  (Characteristics)
A. Trapdoor
I. Produces varying but operationally equivalent copies of itself
B. Time Bomb
II. Code that allows unauthorized quick access at a later time
C. Polymorphic Virus
III. Instructions interpreted rather than executed
D. Macro Virus
IV. Triggers action when specified time occurs

Choose the correct answer from the options given below:

A.

A-III, B-IV, C-I, D-II

B.

A-II, B-IV, C-I, D-III

C.

A-I, B-II, C-III, D-IV

D.

A-II, B-I C-IV, D-III

Correct option is B

Trapdoor:
o A trapdoor (or backdoor) refers to a piece of code that allows unauthorized access to a system or application at a later time.
o Matches with II: Code that allows unauthorized quick access at a later time.
2. Time Bomb:
o A time bomb is a malicious code that remains inactive until a specific time or event triggers it.
o Matches with IV: Triggers action when specified time occurs.
3. Polymorphic Virus:
o A polymorphic virus produces varying but operationally equivalent copies of itself, making it hard to detect.
o Matches with I: Produces varying but operationally equivalent copies of itself.
4. Macro Virus:
o A macro virus is embedded in documents or templates and executes malicious instructions when interpreted rather than compiled.
o Matches with III: Instructions interpreted rather than executed.
Information Booster
1. Trapdoor (Backdoor):
o Malicious code inserted intentionally by developers to allow unauthorized access later.
o Often used by attackers for system exploitation.
2. Time Bomb: Lies dormant until a predefined condition is met, such as a specific date or time.
3. Polymorphic Virus: Alters its code upon replication to evade antivirus detection.
4. Macro Virus: Embedded in macros of documents, typically targeting applications like MS Word or Excel.
Additional Knowledge
· Macro viruses exploit applications rather than operating systems, making them platform-independent.
· Polymorphic viruses are challenging to detect as they constantly change their signature.

Free Tests

Free
Must Attempt

Basics of Education: Pedagogy, Andragogy, and Hutagogy

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon12 Mins
languageIcon English
Free
Must Attempt

UGC NET Paper 1 Mock Test 1

languageIcon English
  • pdpQsnIcon50 Questions
  • pdpsheetsIcon100 Marks
  • timerIcon60 Mins
languageIcon English
Free
Must Attempt

Basics of Education: Pedagogy, Andragogy, and Hutagogy

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon12 Mins
languageIcon English
test-prime-package

Access ‘UGC NET December’ Mock Tests with

  • 60000+ Mocks and Previous Year Papers
  • Unlimited Re-Attempts
  • Personalised Report Card
  • 500% Refund on Final Selection
  • Largest Community
students-icon
354k+ students have already unlocked exclusive benefits with Test Prime!
Our Plans
Monthsup-arrow