Copy of data that can be used to restore and recover data is
The copied data
Backup
Restoration data
None of these
______ infects the master boot record of the system by either moving it to another sector or replacing it with infected one.
Stealth virus
Polymorphic virus
Boot sector virus
File infecting virus
A digital document issued to a site by a certification authority of Internet.
E- code
Digital certificate
Digital signature
Digital id
________ and _________ are the two types of malware.
Harcker and cracker
Harmware and Un-ware
Viruses and Trojans
A program designed to replicate and eat up a computer's storage is called
Virus
Spam
Worm
Mail
Type of back up in which only the data that changed since last backup is saved.
Add backup
Differential backup
Copy - backup
A _______ is a virus that is often discussed as Malicious which also damages files
Trojan Horse
Hacker
Pirate
Tricking people through authentic looking email or website is called
Denial of Service
Phishing
Hacking
Cracking
Which of the following backup methods copies files or folders without any compression?
Full
Differential
Incremental
Mirror
Copy of data created for safe - storage is _____.
D copy
STORED copy
Saved copy