Start learning 50% faster. Sign in now
A Trojan horse is malware that appears to be a legitimate program but carries malicious operations under the hood. Users often unknowingly install Trojans, which then allow unauthorized access or cause harm, such as data theft or system compromise. Why Other Options are Wrong: a) A virus is a self-replicating program but does not disguise itself as legitimate software. b) Worms spread through networks but do not disguise themselves like Trojans. d) Spyware collects data secretly but is not disguised as legitimate software. e) Ransomware locks users out of their system or files but does not disguise itself as legitimate software.
The Marginal Standing Facility (MSF) rate is linked to which of the following rates?
Canara Bank was nationalized in which of the following year?
Which monetary policy tool involves central bank buying and selling government securities to regulate the money supply?
Bharatiya Reserve Bank Note Mudran Private Limited (BRBNMPL) was established by Reserve Bank of India (RBI) as its wholly owned subsidiary on?
Which of the following is a system that powers multiple bank accounts into a single mobile application (of any participating bank)?
The first known mutual aid society in India was ________.
Consider the following statement/s about Companies Act 2013:
1. It received presidential assent on 29 August 2013.
2. It superseded the Co...
During the ______ foreign exchange crisis, Indians transferred the gold reserve to the Bank of England to secure about 405 million loans.
How many projects worth ₹50 crore were inaugurated under PMMSY in northeastern states?
________ happen when RBI desires that liquidity should be squeezed from the economy but Banks are not eager to deposit money with RBI at rate fixed by RBI.