Match List - I with List - II.

List - I

(Computer attack/cyber crime)

List - II

(Definition)

(A)

Worm

(I)

Misdirecting users to a fraudulent website without their knowledge or consent 

(B)

Bot

(II)

A malware that replicates itself in order to spread to other computers across the network

(C)

Denial-of-Service

(III)

Flooding sites with useless traffic to overwhelm a network

(D)

Pharming

(IV)

A malware that responds to external commands sent by an attacker

 

 

 

 

 

 


 

 

 

 

 

 

 

 

 

Choose the correct answer from the options given below:

  1. (A)-(II), (B)-(IV), (C)-(III), (D)-(I) 
  2. (A)-(I), (B)-(III), (C)-(IV), (D)-(II)
  3. (A)-(III), (B)-(II), (C)-(I), (D)-(IV) 
  4. (A)-(IV), (B)-(I), (C)-(II), (D)-(III)

Answer (Detailed Solution Below)

Option 1 : (A)-(II), (B)-(IV), (C)-(III), (D)-(I) 

Detailed Solution

Download Solution PDF

The correct answer is - (A)-(II), (B)-(IV), (C)-(III), (D)-(I)

Key Points

  • Worm (A)-(II)
    • A worm is a type of malware that replicates itself in order to spread to other computers across the network.
    • Unlike viruses, worms do not need to attach themselves to an existing program.
    • They exploit vulnerabilities in operating systems or applications to spread.
  • Bot (B)-(IV)
    • A bot is a malware that responds to external commands sent by an attacker.
    • Bots are often used in botnets to carry out tasks like sending spam emails or participating in DDoS attacks.
    • They allow remote control of the infected system by the attacker.
  • Denial-of-Service (C)-(III)
    • Denial-of-Service (DoS) attacks flood sites with useless traffic to overwhelm a network.
    • The primary goal is to make a website or online service unavailable to its intended users.
    • DDoS (Distributed Denial-of-Service) is a more complex form involving multiple compromised systems to launch the attack.
  • Pharming (D)-(I)
    • Pharming involves misdirecting users to a fraudulent website without their knowledge or consent.
    • It is often used to steal sensitive information such as login credentials and financial data.
    • Pharming can be accomplished by exploiting vulnerabilities in DNS servers or by using malicious software.

Additional Information

  • Malware Types
    • Viruses: Malware that attaches itself to a legitimate program and spreads when the program is executed.
    • Trojans: Malware disguised as legitimate software, which provides unauthorized access to the user's system.
    • Ransomware: Malware that encrypts user data and demands a ransom to restore access.
  • Cyber Security Measures
    • Firewalls: Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
    • Antivirus Software: Programs designed to detect and remove malware from the computer.
    • Encryption: The process of encoding data to prevent unauthorized access.
  • Phishing
    • Similar to pharming but involves tricking users into providing sensitive information through fraudulent emails or messages.
    • Often involves impersonating a trustworthy entity to gain the user's confidence.
Get Free Access Now
Hot Links: teen patti master purana teen patti master 2024 teen patti master apk download teen patti bliss teen patti chart