3. Which of the following is not a category of malware? Worms Trojans Viruses None of...
1. Which of the following is a valid argument against including viruses in the group of ‘life’? a) Viruses are very small b) SomeviruseshavegeneticmaterialmadeofRNA,notDNA c) Viruses are not capable of independent reproduction d) Virusesinfectawiderangeofhosts e) Viruses can evolve very rapidly 2. M13 is a bacteriophage (a type of virus) that infects E. coli cells, and is capable of integrating into the host genome, becoming a prophage. It is likely to enter the ____________ when conditions are not conducive for rapid...
Which of the following statement about virus IS TRUE: A. Viruses can only infect Microsoft windows systems B. Viruses can appear only in data files, or only in word documents, or only in programs. C. Viruses can spread on disks or in via email. D. Viruses cannot REAPPEAR in memory after a complete power off/power on reboot.
Question 1 1 pts Which of the following is true? Viruses cannot evolve because they are not technically alive; they cannot replicate on their own When viruses hijack a host's cells to replicate, mistakes made in the copying of their DNA or RNA can generate a huge number of genetic variants in the virus population A mutation in the molecules involved in binding to a host cell that allows binding to a new host species will not affect the virus's...
A typical packet-filtering firewall has a difficult time protecting against: which? Viruses, worms, or Trojan horses Traffic that is not sent through them Wireless threats that occur at Layer 2 All of the above
Discuss the below security risks to Operating Systems. 1. Denial of Service 2. Worms 3. Viruses 4. Identity theft 5. Theft of Service please write the answer in computer
36. What kind of virus runs in place of the computer's normal system files? A. Worms B. Macro viruses C. File-infector viruses D. Boot sector viruses 37. What of the following features does not distinguish an NGFW from traditional firewalls? A. Application Control B. IDS and/or IPS C. User awareness D. UTM (Unified Threat Management) 38. The act of taking advantage of vulnerability is known as which of the following? a. hacker b. poisoning c. snooping d. exploit 39. What...
Animal Viruses are released from the host cell by which method A. Budding B. Lysis C. Exocytosis D. All of the above . E. None of the above
Which of the following viruses depend on virion enzymes to start the virus replication cycle after delivery of the genome to the host cell? a poliovirus b) influenza c) retrovirus d) all of the above e) b and c of the above ONE or MORE of the following statements is correct. Using the key below, choose the appropriate answer: a) if only 1, 2, and 3, are correct b) if only 1 and 3 are correct c) if only 2...
Which of the following among A-D is false concerning animal viruses? A) During the courses of an influenza virus infection, flu virus proteins are likely to be found in the nucleus, host cell membrane, and cytosol. B) The type of life cycle an animal virus possesses is mostly determined by its genome type C) Lambda phage can form a prophage; an equivalent animal virus type like this would be a retrovirus D) Interferons are produced by certain hosts to defend...
BIO 202 QUIZ #1 1. Viruses are A Small infectious particles B. A simple structure. C. The core of either RNA or DNA. D. A variety of shapes: brick-like, helical, or polyhedral E. All of the above. 2. A typical virus has the following anatomical feature(s): A. Protein coat known as a capsomere. B. Core of either DNA or RNA. C. Capsomeres that constructed from protein subunits or capsids. D. Both A and C E. All of the above. 3....