Is a harmful program that resides in the active memory of the computer and duplicates itself

_________ is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. 

  1. Time Bomb
  2. Trojan
  3. Mellissa virus
  4. Worm
  5. Macro virus

Answer (Detailed Solution Below)

Option 4 : Worm

Free

IBPS RRB Office Assistant Prelims Full Mock Test

80 Questions 80 Marks 45 Mins

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Latest RRB Office Assistant Updates

Last updated on Sep 21, 2022

IBPS RRB Clerk Provisional Allotment List (CRP-RRBs-X) released on 22nd September 2022. Earlier, the IBPS RRB Clerk Prelims Scorecard (CRP RRBs XI) was released on 13th September 2022. The Mains Examination will be held on 24th September 2022. The IBPS RRB Clerk Admit Card for the Mains Exam (CRP-RRB-XI). has also been released and candidates can download the same by 24th September 2022. The final selection of the candidates will be based on their scores in the Mains Exam. A total number of 4483 vacancies are released for the RRB Office Assistant 2022. With a decent pay scale of Rs. 11,765 to Rs. 31,540, it is a golden opportunity for job seekers. Prepare well for your excam with the help of IBPS RRB Clerk books.

c.Spam- abuse of email systems to send unsolicited email to large numbers of people. Mostspam is a form of low-cost commercial advertising, sometimes for questionable productssuch as pornography, phony get-rich-quick schemes, and worthless stock.d.Zombies- Based on a command by the attacker or at a preset time, the botnet computers(also called zombies) go into action, each sending a simple request for access to the targetsite again and again—dozens of times per second. The target computers become sooverwhelmed by requests for service that legitimate users are unable to get through to thetarget computer.i.botnet is used to describe a large group of such computers, which are controlled from oneor more remote locations by hackers, without the knowledge or consent of their owners.e.Identity Theft- occurs when someone steals your personal information and uses it withoutyour permission. Often, stolen personal identification information, such as your name,Social Security number, or credit card number, is used to commit fraud or other crimes.Chapter 12. Ethical, legal & Social issues of IT.1.The difference betweena.Morals- one’s personal beliefs about right and wrong, whereas the term ethics describesstandards or codes of behavior expected of an individual by a group (nation, organization,and profession) to which an individual belongs.b.Ethics- a set of beliefs about right and wrong behavior. Ethical behavior conforms togenerally accepted social norms—many of which are almost universally accepted.c.Laws- a system of rules that tells us what we can and cannot do. Laws are enforced by a setof institutions (the police, courts, law-making bodies). Legal acts are acts that conform tothe law. Moral acts conform to what an individual believes to be the right thing to do. Lawscan proclaim an act as legal, although some people may consider the act immoral—forexample, abortion.2.Table 12-2Systems that gather data about individualsa.Automatic license plate readers (ALPR)i.Used by: Law enforcement agencies, including the U.S. Drug Enforcement Administrationand the U.S. Customs and Border Protection agencyii.How Used: ALPRs snap photos and document the location of vehicles; some systems canalso photograph drivers and passengers. ALPRs are used to snag red-light runners and toidentify motorists with outstanding arrest warrants, overdue parking tickets, and

A harmful program that resides in the active memory of the computer and duplicates itselfCan propagate without human interventionTypes of Exploits

Trojan HorsesA seemingly harmless program in which malicious code is hiddenA victim on the receiving end is usually tricked into opening it because it appears to be useful software from a legitimate sourceThe program’s harmful payload might be designed to enable the attacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or spy on usersOften creates a “backdoor” on a computer that enables an attacker to gain future accessLogic bombA type of Trojan horse that executes when it is triggered by a specific eventTypes of Exploits

Blended ThreatA sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payloadMight use server and Internet vulnerabilities to initiate and then transmit and spread an attack using EXE files, HTML files, and registry keysTypes of Exploits

SpamThe use of email systems to send unsolicited email to large numbers of peopleAlso an inexpensive method of marketing used by many legitimate organizationsControlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirementsSpammers cannot disguise their identity by using a false return addressThe email must include a label specifying that it is an ad or a solicitation The email must include a way for recipients to opt out of future Types of Exploits

Distributed Denial-of-Service AttacksAn attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasksKeeps target so busy responding to requests that legitimate users cannot get inBotnetA large group of computers, controlled from one or more remote locations by hackers, without the consent of their ownersTypes of Exploits

RootkitA set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledgeAttackers can use the rootkit to execute files, access logs, monitor user activity, and change the computer’s configurationSymptoms of rootkit infections:Computer locks up or fails to respond to input from the keyboardScreen saver changes without any action on the part of the userTaskbar disappearsNetwork activities function extremely slowTypes of Exploits

Advanced Persistent ThreatAPT is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealing data over a long period of timeAn APT attack advances through the following five phases:ReconnaissanceIncursionDiscoveryCaptureExport

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 39 pages?

Upload your study docs or become a

Course Hero member to access this document

Professor

Robert MC caththy

What is a harmful program to a computer system?

Harmful Software (Malware) Malware is a shortened term for "malicious software." Malware is software designed to infiltrate or damage a computer without the owner's consent or knowledge. There are many types of malware, including: Viruses: malware that spreads from computer disks, CD-ROMs, and other storage media.

Which type of malware resides in the active memory and replicates itself over a network?

Worm - In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user.

What is a program that is very destructive and copies and duplicates itself into computer files?

Virus is a program written to enter to your computer and damage/alter your files/data. A virus might corrupt or delete data on your computer. Viruses can also replicate themselves.

Which are malware programs duplicate itself?

Worms. Computer worms are a type of standalone malware program that can duplicate itself in order to jump to other computers. It uses the computer network to spread itself.