hamburger menu
All Coursesall course arrow
adda247
reward-icon
adda247
    arrow
    arrow
    arrow
    Match the List – I with List – II.List – I (Malware types)List – II  (Characteristics) A. Trapdoor I. Produces varying but operationally equivale
    Question

    Match the columns.

    Match the List – I with List – II.

    List – I (Malware types)
    List – II  (Characteristics)
    A. Trapdoor
    I. Produces varying but operationally equivalent copies of itself
    B. Time Bomb
    II. Code that allows unauthorized quick access at a later time
    C. Polymorphic Virus
    III. Instructions interpreted rather than executed
    D. Macro Virus
    IV. Triggers action when specified time occurs

    Choose the correct answer from the options given below:

    A.

    A-III, B-IV, C-I, D-II

    B.

    A-II, B-IV, C-I, D-III

    C.

    A-I, B-II, C-III, D-IV

    D.

    A-II, B-I C-IV, D-III

    Correct option is B

    Trapdoor:
    o A trapdoor (or backdoor) refers to a piece of code that allows unauthorized access to a system or application at a later time.
    o Matches with II: Code that allows unauthorized quick access at a later time.
    2. Time Bomb:
    o A time bomb is a malicious code that remains inactive until a specific time or event triggers it.
    o Matches with IV: Triggers action when specified time occurs.
    3. Polymorphic Virus:
    o A polymorphic virus produces varying but operationally equivalent copies of itself, making it hard to detect.
    o Matches with I: Produces varying but operationally equivalent copies of itself.
    4. Macro Virus:
    o A macro virus is embedded in documents or templates and executes malicious instructions when interpreted rather than compiled.
    o Matches with III: Instructions interpreted rather than executed.
    Information Booster
    1. Trapdoor (Backdoor):
    o Malicious code inserted intentionally by developers to allow unauthorized access later.
    o Often used by attackers for system exploitation.
    2. Time Bomb: Lies dormant until a predefined condition is met, such as a specific date or time.
    3. Polymorphic Virus: Alters its code upon replication to evade antivirus detection.
    4. Macro Virus: Embedded in macros of documents, typically targeting applications like MS Word or Excel.
    Additional Knowledge
    · Macro viruses exploit applications rather than operating systems, making them platform-independent.
    · Polymorphic viruses are challenging to detect as they constantly change their signature.

    Free Tests

    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English
    Free
    Must Attempt

    UGC NET Paper 1 Mock Test 1

    languageIcon English
    • pdpQsnIcon50 Questions
    • pdpsheetsIcon100 Marks
    • timerIcon60 Mins
    languageIcon English
    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English
    test-prime-package

    Access ‘UGC NET December’ Mock Tests with

    • 60000+ Mocks and Previous Year Papers
    • Unlimited Re-Attempts
    • Personalised Report Card
    • 500% Refund on Final Selection
    • Largest Community
    students-icon
    368k+ students have already unlocked exclusive benefits with Test Prime!
    Our Plans
    Monthsup-arrow