COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Computer viruses come in many forms. Which of the following descriptions is most UNlikely to be describing a virus?
A
It is attached to a program and runs each time the program is opened.
B
It is disguised as an accounting program and runs when the program is opened.
C
It is sent as an email that asks recipients for their credit card numbers.
D
It is a piece of software that looks for security holes in a network and uses those holes to infect other computers.
Explanation: 

Detailed explanation-1: -A computer virus performs two basic functions: it copies itself from machine to machine (self-reproducing), and it executes the instructions the perpetrator has planned. A computer virus exhibits three characteristics: a replication mechanism, an activation mechanism, and an objective.

Detailed explanation-2: -Based on their host, viruses can be classified into three types, namely, animal viruses, plant viruses, and bacteriophages.

Detailed explanation-3: -Most viruses, Trojan horses, and worms are activated when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message. It’s best to limit what HTML is available in your email messages.

Detailed explanation-4: -Morris Worm. Nimda. ILOVEYOU. SQL Slammer. Stuxnet. CryptoLocker. Conficker. Tinba. More items

There is 1 question to complete.