Railway Science (Computer – Computer Threats)Total Questions: 41. Trojan Horse is a form of : [RRB NTPC CBT - I (23/01/2021) Morning](a) Virus attack(b) Melissa worm(c) Slammer worm(d) Service attackCorrect Answer: (a) Virus attackSolution:Trojan Horse - When a computer virus attaches itself to another computer program. Some examples of viruses:- CryptoLocker, Code Red, ILOVEYOU, Shlayer.2. A programme or piece of code that is loaded onto a person’s computer without his/her knowledge and runs against his/her wishes is a type of malware called : [RRB NTPC CBT - I (07/03/2021) Morning](a) Virus(b) Trojan Horse(c) Spyware(d) ZeusCorrect Answer: (a) VirusSolution:Virus (Vital Information Resources Under Siege)- Trojan horse, spyware and zeus are the names of computer viruses.3. Which of the following Computer viruses damages the formatting of a document and does NOT allow it to edit? [RRB NTPC CBT - I (03/03/2021) Evening](a) File virus(b) Macro virus(c) Worm(d) Boot sector virusCorrect Answer: (b) Macro virusSolution:Worms are malware that self-replicate & propagate independently once in the system. Boot sector viruses infect the boot sector or the partition table of a disk.4. An attempt to obtain sensitive information such as username, password and credit card details, etc. for malicious reasons is termed as: [RRB NTPC CBT - I (01/04/2021) Morning](a) Phishing(b) Digging(c) Surfing(d) NettingCorrect Answer: (a) PhishingSolution:A fake email from a bank asking you to click a link and verify your account details is an example of phishing. Surfing is looking for information on the Internet with no apparent goal.Submit Quiz