Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
Home
Digital Malware Analysis
A computer program comprising a malicious segment that connects itself to an application program or...
0
votes
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
Select the correct option from below list
a)Virus
b)Adware
c)Spam
d)Flash cookie
malicious-segment
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 16, 2022
by
sharadyadav1986
a)Virus
A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as Virus
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: A computer program carrying a malicious segment that joins itself to other executable component or an application program is called ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
0
votes
Q: In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
0
votes
Q: In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
malware
0
votes
Q: Malicious code activated by a specific event or when a specific condition is met is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-code-activate
malicious-code
0
votes
Q: Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
harmful-programs
private-computer
0
votes
Q: Type of malware that performs unwanted and harmful actions in disguise of a legitimate program is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-types
0
votes
Q: A network of infected systems under the control of a hacker, whose intention is to damage other computer networks by making them unavailable is called __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
infected-system
hacker-control
0
votes
Q: Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
data-files
0
votes
Q: A type of Trojan installed through an exploit or an email attachment onto a PC is known as _____________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
trojan
email-attachment
0
votes
Q: Modifying a data within the system to achieve a malicious goal is known as __________
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#data-tempring
...