in Technology by

Which one of the following is also referred to as malicious software?

  1. Maliciousware
  2. Badware
  3. Ilegalware
  4. Malware

1 Answer

0 votes
by

Answer: d

Explanation: Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.

Related questions

0 votes
    Which of the following is also referred to as random variable? (a) stochast (b) aleatory (c) eliette ... questions and answers pdf, Data Science interview questions for beginners...
asked Oct 29, 2021 in Education by JackTerrance
0 votes
    Which of the following technique is also referred to as Bagging? (a) Bootstrap aggregating (b) Bootstrap ... and answers pdf, Data Science interview questions for beginners...
asked Oct 29, 2021 in Education by JackTerrance
0 votes
    Which of the following is also referred to as overlayed 1D plot? (a) lattice (b) barplot (c) gplot ... questions and answers pdf, Data Science interview questions for beginners...
asked Oct 29, 2021 in Education by JackTerrance
0 votes
    This attack can be deployed by infusing a malicious code in a website's comment section. What is this attack ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    The cylindrical coordinate system is also referred to as (a) Cartesian system (b) Circular system ... by,electromagnetic theory engineering physics,electromagnetic theory nptel...
asked Nov 11, 2021 in Education by JackTerrance
0 votes
    The loss tangent is also referred to as (a) Attenuation (b) Propagation (c) Dissipation ... proposed by,electromagnetic theory engineering physics,electromagnetic theory nptel...
asked Nov 6, 2021 in Education by JackTerrance
0 votes
    A dump of the database contents is also referred to as an _____________ dump. (a) Archival (b) Fuzzy ... with Nonvolatile Storage in portion Recovery System of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    ________ is a technique where attackers modify legitimate software to hide a malicious application. Wipers Exploits Code caves Weaponized documents...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    Software robots are also known as ________. 1. Clients 2. None of the options. 3. Clients or Agents 4. Agents...
asked Aug 30, 2021 in Technology by JackTerrance
0 votes
    A search key containing more than one attribute is referred to as a _________ search key. (a) Simple ... , Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    In the context of digital computer, which of the following pairs of digits is referred to as binary code ? 1. 3 and 4 2. 0 and 1 3. 2 and 3 4. 1 and 2...
asked Jul 14, 2022 in Education by JackTerrance
0 votes
    Which of the following is commonly referred to as data fishing'? (a) Data bagging (b) Data booting ( ... questions and answers pdf, Data Science interview questions for beginners...
asked Oct 30, 2021 in Education by JackTerrance
0 votes
    Which of the following can be used to prevent end users from entering malicious scripts? (1)Input validation (2)Server side encoding (3)Authentication (4)Dynamic encoding...
asked May 17, 2021 in Technology by JackTerrance
...