in Education by
Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus? (a) Research purpose (b) Pranks (c) Identity theft (d) Protection The question was posed to me during an interview. The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf, Cyber Security questions and solutions, Cyber Security mcq Test , Interview Cyber Security questions, Data Science Questions for Interview, Cyber Security MCQ (Multiple Choice Questions),Core Cyber Security Questions, Core Cyber Security MCQ,core Cyber Security interview questions for experiencedcore Cyber Security interview questions for 3 years experience,Cyber Security programming questions,core Cyber Security interview questions for freshers,Data Science interview questions and answers for freshers, Cyber Security programming questions and answers pdf, Cyber Security interview questions for beginnersCyber Security-Tutorial-for-Beginners,What-is-Cyber Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications

1 Answer

0 votes
by
 
Best answer
Right answer is (d) Protection To elaborate: Computer virus is not created for protection. Virus writers may have other reasons like for research purpose, pranks, vandalism, financial gain, identity theft, and some other malicious purposes.

Related questions

0 votes
    According to the CIA Triad, which of the below-mentioned element is not considered in the triad? (a) Confidentiality ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned protocol is not susceptible to sniffing? (a) HTTP (b) SMTP (c) POP (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned protocol is not susceptible to sniffing? (a) NNTP (b) UDP (c) FTP (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    There are _________ types of computer virus. (a) 5 (b) 7 (c) 10 (d) 12 This question was addressed ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned penetration testing tool is popularly used in gaining access phase? (a) Maltego (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned tool is used for Wi-Fi hacking? (a) Wireshark (b) Nessus (c) Aircrack-ng (d) ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of them is not a reason for competitive information gathering? (a) Compare your product with competitors (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a type of virus? (a) Boot sector (b) Polymorphic (c) Multipartite (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of them is not an ideal way of spreading the virus? (a) Infected website (b) Emails (c) ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)? ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In which year Apple II virus came into existence? (a) 1979 (b) 1980 (c) 1981 (d) 1982 I got ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _________ are a specific section of any virus or malware that performs illicit activities in a system. (a) Malicious ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ___________________ are some very frequent updates that come for every anti-virus. (a) Patch update (b) Data update ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The antivirus or PC defender software in a system helps in detecting virus and Trojans. (a) True (b) False I ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...