MCQOPTIONS
 Saved Bookmarks
				This section includes 6 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    Multipartite viruses attack on _____________ | 
                            
| A. | files | 
| B. | boot sector | 
| C. | memory | 
| D. | all of the mentioned | 
| Answer» E. | |
| 2. | 
                                    File virus attaches itself to the _____________ | 
                            
| A. | source file | 
| B. | object file | 
| C. | executable file | 
| D. | all of the mentioned | 
| Answer» D. all of the mentioned | |
| 3. | 
                                    The pattern that can be used to identify a virus is known as _____________ | 
                            
| A. | stealth | 
| B. | virus signature | 
| C. | armoured | 
| D. | multipartite | 
| Answer» C. armoured | |
| 4. | 
                                    The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________ | 
                            
| A. | logic bomb | 
| B. | trap door | 
| C. | code stacker | 
| D. | none of the mentioned | 
| Answer» B. trap door | |
| 5. | 
                                    The code segment that misuses its environment is called a _____________ | 
                            
| A. | internal thief | 
| B. | trojan horse | 
| C. | code stacker | 
| D. | none of the mentioned | 
| Answer» C. code stacker | |
| 6. | 
                                    When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________ | 
                            
| A. | denial-of-service attack | 
| B. | slow read attack | 
| C. | spoofed attack | 
| D. | starvation attack | 
| Answer» B. slow read attack | |