A computer virus must attach itself to a host file or program in order to execute and make copies of itself. Without that host, the virus cannot activate or spread. In contrast, a worm is a fully self-contained program that propagates across networks without a host, while a Trojan masquerades as legitimate software to deceive users. A rootkit's primary purpose is to hide unauthorized privileged access rather than to replicate. Therefore, dependency on a host file is the defining trait unique to viruses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the primary role of a host file in a computer virus?
Open an interactive chat with Bash
How do worms differ from viruses in terms of propagation?
Open an interactive chat with Bash
What vulnerabilities do Trojans exploit compared to viruses?
Open an interactive chat with Bash
ISC2 Certified in Cybersecurity (CC)
Network Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .