InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is Anti-spyware Program?what Is Anti-spam Program? |
|
Answer» Anti-Spyware Program : Anti-spyware program is a type of program DESIGNED to prevent and detect unwanted spyware program INSTALLATIONS and to remove those programs if installed. Examples of Anti-spyware program:
Anti-Spam Program : Anti-spam software tries to identify useless or DANGEROUS messages for you. Anti-Spyware Program : Anti-spyware program is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Examples of Anti-spyware program: Anti-Spam Program : Anti-spam software tries to identify useless or dangerous messages for you. |
|
| 2. |
What Is Antivirus Program? Give Few Examples? |
|
Answer» Antivirus Program :
Examples of Antivirus Program :
Antivirus Program : Examples of Antivirus Program : |
|
| 3. |
What Is Anti-malware Program? |
|
Answer» Anti-MALWARE Program : Anti-Malware program is used to PREVENT, detect, and remove COMPUTER viruses, worms, trojan horses and any other TYPE of malware. Examples of Anti-Malware program:
Anti-Malware Program : Anti-Malware program is used to prevent, detect, and remove computer viruses, worms, trojan horses and any other type of malware. Examples of Anti-Malware program: |
|
| 4. |
What Are The Symptoms? |
|
Answer» Symptoms :
Symptoms : |
|
| 5. |
How Can You Protect Your Computer? |
| Answer» | |
| 6. |
What Are The Damages Of Malware? |
|
Answer» Damages of Malware Data LOSS : Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files. Account Theft : Many TYPES of malware include keylogger functions, designed to steal accounts and passwords from their targets. This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks. Botnets : Many types of malware also subvert CONTROL over the user's computer, turning it into a "bot" or "zombie." Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails. Financial Losses : If a hacker GAINS access to a CREDIT card or bank account via a keylogger, he can then use that information to run up charges or drain the account. Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack. Damages of Malware Data Loss : Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files. Account Theft : Many types of malware include keylogger functions, designed to steal accounts and passwords from their targets. This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks. Botnets : Many types of malware also subvert control over the user's computer, turning it into a "bot" or "zombie." Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails. Financial Losses : If a hacker gains access to a credit card or bank account via a keylogger, he can then use that information to run up charges or drain the account. Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack. |
|
| 7. |
How Malware Spreads? |
|
Answer» Malware is a program that must be triggered or somehow executed before it can infect your COMPUTER system and spread to others. Here are some examples on how malware is distributed: Malware is a program that must be triggered or somehow executed before it can infect your computer system and spread to others. Here are some examples on how malware is distributed: |
|
| 8. |
What Is Ransomware? |
|
Answer» Ransomware :
Ransomware : |
|
| 9. |
What Is Zombie? |
|
Answer» Zombie : Zombie PROGRAMS take CONTROL of your COMPUTER and USE it and its Internet connection to attack other computers or networks or to PERFORM other criminal activities. Zombie : Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities. |
|
| 10. |
What Are Worms? |
|
Answer» Worms
Worms |
|
| 11. |
What Is Trojan Horse?give Few Examples? |
|
Answer» Trojan Horse
Example of Trojan Horses : Trojan Horse Example of Trojan Horses : |
|
| 12. |
Give Few Examples Of Viruses? |
|
Answer» Examples of COMPUTER viruses are: Examples of computer viruses are: |
|
| 13. |
What Is A Virus? |
|
Answer» Viruses :
Viruses :
|
|
| 14. |
What Are The Types Of Malware? |
|
Answer» Types of Malware : Types of Malware : |
|
| 15. |
What Are The Uses Of Usage Of Malware? |
|
Answer» USAGE of Malware :
Usage of Malware : |
|
| 16. |
What Is Meant By Malware? |
Answer»
|
|