arrow
arrow
arrow
Which of followrng statements are correct?A. Worm can be hardware and software.B. Cookies are used to store browsing information.C. Sandbox detection
Question

Which of followrng statements are correct?
A. Worm can be hardware and software.
B. Cookies are used to store browsing information.
C. Sandbox detection is malware identification method.
D. HTTP has better security than H'I'I'PS.
E. Trojan is an antivirus.
Choose the correct answer from the options given below:

A.

A, B and C Only

B.

C and E Only

C.

B and C Only

D.

B and D Only

Correct option is C

Introduction: In the area of Information and Communication Technology (ICT), it is essential to differentiate between various concepts related to internet security, malware detection, and data storage. Understanding these terms helps in identifying safe and secure computing practices.​

Information Booster:

The correct statements are:

B. Cookies are used to store browsing information.: Cookies are small files stored on a user's device, containing information about their browsing activities, preferences, and interactions with websites.

C. Sandbox detection is malware identification method.: Sandbox detection involves running suspicious files or programs in a controlled, isolated environment (sandbox) to analyze their behavior and identify potential malware.

The following statements are incorrect:

A. Worm can be hardware and software.: Worms are typically software-based malware that replicate themselves and spread to other systems. They are not hardware-related.

D. HTTP has better security than HTTPS.: HTTPS (Hypertext Transfer Protocol Secure) provides end-to-end encryption and is more secure than HTTP (Hypertext Transfer Protocol), which transmits data in plain text.

E. Trojan is an antivirus.: A Trojan is a type of malware that disguises itself as legitimate software, often to gain unauthorized access to a system. It is not an antivirus.

The correct answers are B and C.

Additional Knowledge:

It's crucial to distinguish between different types of malware (viruses, worms, Trojans, ransomware, spyware) and security tools (antivirus, firewalls, intrusion detection systems).

Always look for "https://" in the URL and a padlock icon in your browser to ensure a secure connection when transmitting sensitive information online.

Free Tests

Free
Must Attempt

Basics of Education: Pedagogy, Andragogy, and Hutagogy

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon12 Mins
languageIcon English
Free
Must Attempt

UGC NET Paper 1 Mock Test 1

languageIcon English
  • pdpQsnIcon50 Questions
  • pdpsheetsIcon100 Marks
  • timerIcon60 Mins
languageIcon English
Free
Must Attempt

Basics of Education: Pedagogy, Andragogy, and Hutagogy

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon12 Mins
languageIcon English

Similar Questions

test-prime-package

Access ‘UGC NET December’ Mock Tests with

  • 60000+ Mocks and Previous Year Papers
  • Unlimited Re-Attempts
  • Personalised Report Card
  • 500% Refund on Final Selection
  • Largest Community
students-icon
353k+ students have already unlocked exclusive benefits with Test Prime!
Our Plans
Monthsup-arrow