Which type of malicious software is used to steal passwords typed into a computer?
Latest Types of Malicious Softwares MCQ Objective QuestionsTypes of Malicious Softwares Question 1:What is Anti-spyware software? Show
Answer (Detailed Solution Below)Option 2 : It detects and removes programs installed illegally on a user's computer system Spyware is software that secretly records information about user activities on their system. It could capture credit card details that can be used by cybercriminals for unauthorized shopping, money withdrawing, etc. Key PointsAnti-spyware
Hence anti-spyware software detects and removes programs installed illegally on a user's computer system. Additional Information
Types of Malicious Softwares Question 2:Which one of the following is a disadvantage of using proprietary software rather than open source software?
Answer (Detailed Solution Below)Option 4 : Proprietary software is usually more expensive The Correct answer is Proprietary software is usually more expensive A software whose source code is freely distributed with a license to study, change, and further distribute to anyone for any purpose is called open-source software. Software that can be used only by obtaining a license from its developer after paying for it is called proprietary software. Key Points
Hence the correct answer is Proprietary software is usually more expensive Types of Malicious Softwares Question 3:Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R Assertion A: Malware is an unwanted software that an unauthorized person wants to run on other computers. Reason R: Virus obtains control of a computer and directs it to perform unusual and often destructive actions. In light of the above statements, choose the correct answer from the options given below:
Answer (Detailed Solution Below)Option 2 : Both A and R are correct but R is not the correct explanation of A. Assertion A: Malware is an unwanted software that an unauthorized person wants to run on other computers. Explanation:
Thus, A is correct. Reason R: Virus obtains control of a computer and directs it to perform unusual and often destructive actions. Explanation:
Thus, R is correct but R is not the correct explanation of A. Hence, Both A and R are correct but R is not the correct explanation of A. Types of Malicious Softwares Question 4:The process through which an illegitimate website pretends to be a specific legitimate website is known as
Answer (Detailed Solution Below)Option 2 : spoofing The process through which an illegitimate website pretends to be a specific legitimate website is known as "spoofing." Spoofing:
1. Sniffing:
2. Back Doors
3. War Dialing:
Types of Malicious Softwares Question 5:Ankur receives an email informing him that his credit card is going to be cancelled. The email advises him to click on the provided link and sign into his online banking account to prevent this from happening, which he does. A week later, Ankur notices that Rs. 10,000 has been withdrawn from his bank account. What has Ankur fallen victim to?
Answer (Detailed Solution Below)Option 1 : A phishing scam A phishing scam:
A Trojan horse:
Online blackmail:
A virus:
The process through which an illegitimate website pretends to be a specific legitimate website is known as
Answer (Detailed Solution Below)Option 2 : spoofing The process through which an illegitimate website pretends to be a specific legitimate website is known as "spoofing." Spoofing:
1. Sniffing:
2. Back Doors
3. War Dialing:
"Skimming" in e-banking refers to
Answer (Detailed Solution Below)Option 1 : Identifying fraudsters copying vital information from credit cards Skimming" in e-banking refers to Identifying fraudsters copying vital information from credit cards
In the context of IT/ICT, which one of the following about spamming is true?
Answer (Detailed Solution Below)Option 1 : Spamming is posting or e-mailing unsolicited advertising messages to a wide audience ICT provides information and communication technology for people to connect and learn. It has an essential role to play in the education sector. The explosive growth of the Internet has brought forth a proliferation of advertising messages spread online. Spamming:
NOTE: Phishing: It is an attempt to target confidential and sensitive information including usernames and passwords, credit card details, bank account information and other personal information by falsely mimicking or masquerading a trustworthy entity. Hence, it can be concluded from the given points that in the context of ICT, spamming is posting or e-mailing unsolicited advertising messages to a wide audience. Radha receives an email claiming that her credit card account is about to be suspended unless she emails her credit card details and personal identification number (PIN) immediately. What is this an example of?
Answer (Detailed Solution Below)Option 2 : Phishing The correct solution is "Phishing". Phishing is acquiring the personal and sensitive information of a person through official-looking emails. Users of online banking and e-commerce websites are more prone to this attack. Key Points Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper, and scareware. Different types of malicious software are:
What is spyware in respect of computer software?
Answer (Detailed Solution Below)Option 1 : Software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity. These days most of our important transactions happen over the internet which leads to exposing our personal data to cybercriminals or hackers. These hackers have devised numerous ways to steal important data which is then put to misuse. Malware: It is short for ‘malicious software’. Malware' is a general term used to refer to a variety of intrusive software. Types of Malware
Hence, it can be concluded from the given points that spyware is a software that aims to gather information about a person without his/her knowledge and that may send such information to another entity. Given below are two statements, one is labeled as Assertion A and the other is labeled as Reason R Assertion A: Privacy and security of user data are at stake on the Internet. Reason R: No steps are being taken by the user for the security and privacy of data. In light of the above statements, choose the most appropriate answer from the options given below
Answer (Detailed Solution Below)Option 1 : Both A and R are correct and R is the correct explanation of A Privacy: It helps to block websites, internet browsers, cable companies, and internet service providers from tracking your information and your browser history. Security: It helps protect you from other people accessing your personal information and other data. Assertion:
Hence, the assertion is correct. Reason:
Hence, the reason is also correct. So, Both A and R are correct and R is the correct explanation of A. Ankur receives an email informing him that his credit card is going to be cancelled. The email advises him to click on the provided link and sign into his online banking account to prevent this from happening, which he does. A week later, Ankur notices that Rs. 10,000 has been withdrawn from his bank account. What has Ankur fallen victim to?
Answer (Detailed Solution Below)Option 1 : A phishing scam A phishing scam:
A Trojan horse:
Online blackmail:
A virus:
Extra browser window of commercials that open automatically on browsing web pages is called
Answer (Detailed Solution Below)Option 4 : pop-up The process through which an illegitimate website pretends to be a specific legitimate website is known as "spoofing." Spoofing:
1. Sniffing:
2. Back Doors
3. War Dialing:
A programme that deletes all the data from a computer is
Answer (Detailed Solution Below)Option 3 : Sweeper The process through which an illegitimate website pretends to be a specific legitimate website is known as "spoofing." Spoofing:
1. Sniffing:
2. Back Doors
3. War Dialing:
A virus type that is capable of transferring from one computer to another without any ‘user interaction’ is known as
Answer (Detailed Solution Below)Option 1 : Worm Malicious software or malware are programs intentionally designed to perform some unauthorized - often harmful or undesirable actions. Malware can gain remote access to any computer and send that from that system to a third party without the user’s knowledge. This malware exists in many forms. Types of Malware:
NOTE: Phishing: This kind of activity is performed by falsely mimicking or masquerading a trustworthy entity in an attempt to scam the recipient to divulge private information regarding themselves. Hence, it can be concluded that a worm is a virus type that is capable of transferring from one computer to another without any user interaction. What type of software is malicious software?Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
What are the 3 types of malware attacks?What Are the Most Common Types of Malware Attacks?. 1) Adware.. 2) Fileless Malware.. 3) Viruses.. 4) Worms.. 5) Trojans.. 6) Bots.. 7) Ransomware.. 8) Spyware.. What type of malware steals personal information?Spyware. Spyware invades your computer and attempts to steal your personal information such as credit card or banking information, web browsing data, and passwords to various accounts.
Which type of malicious programs enter your computer through Internet?Malware is designed to cause damage to a stand-alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan. Virus is a program written to enter to your computer and damage/alter your files/data.
|