Question:

Match List I with List II
LIST ILIST II
A. Doxing operationsIV. Cyber bullying
B. FOSSIII. It grants a user substantial rights and freedom
C. WORMII. It is a program which copies itself across a network
D. TROJAN HORSEI. It is a program which is intended to carry out malicious operations

Show Hint

Be aware of different types of cybersecurity threats, such as trojans, worms, and the dangers of doxing, which can lead to serious privacy violations.
Updated On: Apr 24, 2025
  • A-IV, B-III, C-II, D-I
  • A-I, B-II, C-III, D-IV
  • A-IV, B-I, C-III, D-II
  • A-II, B-I, C-IV, D-III
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is A

Solution and Explanation

- Doxing is associated with Cyber bullying (A-IV).
- FOSS refers to software that grants the user substantial rights and freedom (B-III).
- A WORM is a program that replicates itself across a network (C-II).
- A TROJAN HORSE is a program designed to carry out malicious operations (D-I).
Therefore, the correct answer is "A-IV, B-III, C-II, D-I."
Was this answer helpful?
0
0

Questions Asked in CUET exam

View More Questions