Last visit was: 25 Apr 2024, 00:31 It is currently 25 Apr 2024, 00:31

Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
SORT BY:
Date
Tags:
Show Tags
Hide Tags
Current Student
Joined: 13 Apr 2015
Posts: 1436
Own Kudos [?]: 4545 [7]
Given Kudos: 1228
Location: India
Send PM
Most Helpful Reply
Tutor
Joined: 16 Oct 2010
Posts: 14821
Own Kudos [?]: 64906 [1]
Given Kudos: 426
Location: Pune, India
Send PM
General Discussion
Manager
Manager
Joined: 24 Oct 2013
Posts: 108
Own Kudos [?]: 58 [0]
Given Kudos: 129
Location: India
Concentration: General Management, Strategy
WE:Information Technology (Computer Software)
Send PM
Current Student
Joined: 13 Apr 2015
Posts: 1436
Own Kudos [?]: 4545 [2]
Given Kudos: 1228
Location: India
Send PM
Re: A particular computer virus frequently infects personal computers [#permalink]
2
Kudos
Question Type: Complete the passage

Main Point: No virus detection \(\neq\) Virus installation blocked
Missing Info: The virus may be present in a disguised form

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective - Incorrect. Effectiveness of the virus is not disputed in the argument. Out of context.

B. the virus was able to replicate itself and then send itself to people in the victim's address book - Incorrect. Out of scope.

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active - Incorrect. Out of scope.

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool - Correct. If the virus disguised itself in the system as a virus removal tool then it it undetected.

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system. - Incorrect. Again this is not relevant to the main point.

Answer: D
Manager
Manager
Joined: 21 Jul 2017
Posts: 154
Own Kudos [?]: 115 [0]
Given Kudos: 143
Location: India
Concentration: Social Entrepreneurship, Leadership
GMAT 1: 660 Q47 V34
GPA: 4
WE:Project Management (Education)
Send PM
Re: A particular computer virus frequently infects personal computers [#permalink]
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

We need to find a reason to support the point. Only D fits in as it presents the alternate why the virus is not detected even when it's present.
Manager
Manager
Joined: 08 Jan 2013
Posts: 68
Own Kudos [?]: 62 [1]
Given Kudos: 22
Send PM
A particular computer virus frequently infects personal computers [#permalink]
1
Kudos
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

Which of the following most logically completes the argument?

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective. OFS - this does not explain why virus is undetected

B. the virus was able to replicate itself and then send itself to people in the victim's address book. OFS - this does not explain why virus is undetected

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active. OFS - no reason why virus is undetected

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool. Correct

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system. OFS - no reason why virus is undetected
Intern
Intern
Joined: 09 Nov 2016
Posts: 5
Own Kudos [?]: [0]
Given Kudos: 9
Send PM
Re: A particular computer virus frequently infects personal computers [#permalink]
D is the most relevant of all. so D should be answer
Intern
Intern
Joined: 16 Oct 2017
Posts: 18
Own Kudos [?]: 37 [0]
Given Kudos: 15
Send PM
Re: A particular computer virus frequently infects personal computers [#permalink]
abhijeet4316 wrote:
D is the most relevant of all. so D should be answer


Yes, You are right!
Thanks for the explanation!
Manager
Manager
Joined: 21 May 2017
Posts: 59
Own Kudos [?]: 101 [1]
Given Kudos: 66
Location: India
GMAT 1: 660 Q49 V31
Send PM
Re: A particular computer virus frequently infects personal computers [#permalink]
1
Kudos
Vyshak wrote:
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

Which of the following most logically completes the argument?

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective

B. the virus was able to replicate itself and then send itself to people in the victim's address book

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system.





A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective--- it can still be detected by virus scanning software ,wrong

B. the virus was able to replicate itself and then send itself to people in the victim's address book--- irrelevant

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active---incorrect

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool--- relevant

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system.[/quote]-- incorrect
Math Expert
Joined: 02 Sep 2009
Posts: 92901
Own Kudos [?]: 618868 [0]
Given Kudos: 81588
Send PM
Re: A particular computer virus frequently infects personal computers [#permalink]
Expert Reply
Vyshak wrote:
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

Which of the following most logically completes the argument?

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective

B. the virus was able to replicate itself and then send itself to people in the victim's address book

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system.


OFFICIAL EXPLANATION:



Reading the question: We have seen a fill-in-the-blank question before, in "Auto Body." Such questions may be phrased with or without a printed line signifying the blank. As we discussed in Auto Body, what goes in the blank should be a logical continuation of the prompt. Logical tests tend not to be possible on this type of question, so we will rely on our filter, ideally a prediction.

Creating a filter: how can we predict what goes in the blank? It must not contradict what has come before and it should finish the expression of the idea. The key is that the virus is on the computer even though the scanning software hasn't detected it. We could imagine that there is a defect in the scanner, or an ingenious design to the virus. Note that you are not expected to know anything about IT security for this question. Critical Reasoning questions are designed not to require any outside knowledge. Outside knowledge may still be useful, inevitably, and that's why the questions cover a range of topics. We could decide on the prediction, "The virus has outsmarted the security systems," as our filter.

Applying the filter: Do any answer choices match our prediction? Choice (A) somewhat does, but rather vaguely. Choice (B) doesn't address why the virus wasn't detected. Choice (C) also doesn't seem to address why the virus wasn't detected, though we might be able to read something into the term "backdoor." Choice (D) would definitely constitute outsmarting the security system. Choice (E) involves outsmarting, but not in a way that would necessarily obscure detection. We're left with (D). We confirm the logic: the correct answer must give an explanation for how a virus might have gone undetected by security systems. Choice (D) is the only option. Choice (C) sounds close, but we presume that many viruses possess backdoors and are detected.

The correct answer is (D).
Senior Manager
Senior Manager
Joined: 05 Jan 2019
Posts: 474
Own Kudos [?]: 342 [0]
Given Kudos: 28
Send PM
A particular computer virus frequently infects personal computers [#permalink]
The conclusion: Even though the virus was not detected by the antivirus software, we cannot say that the computer was successful in blocking the installation of the virus.

We have been asked to strengthen the conclusion. So, let us find that answer choice that does strengthen the conclusion.

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective - we are concerned with the virus that spread through email. (A) does not make it clear whether modified version of this virus has been effective via email or via the whole internet domain. Hence, eliminate (A)

B. the virus was able to replicate itself and then send itself to people in the victim's address book - we are concerned with what happens to a particular computer once it gets infected by the virus. Knowing the fact that the virus has spread to 'other computers' does nothing to strengthen the conclusion drawn. Hence, eliminate (B).

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active - does this mean that these initial infections can still cause damage? can these initial infections be detected by the antivirus? (C) does not clearly strengthen the conclusion. hence, eliminate (C).

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool - Okay. Now we know a reason why the antivirus was not able to pick up the virus. This strengthens the idea that 'the computer antivirus was not successful in detecting the virus'. Hence, (D) is the right answer choice.

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system. - Irrelevant since it does not strengthen nor weaken the conclusion. Hence, eliminate (E).
User avatar
Non-Human User
Joined: 01 Oct 2013
Posts: 17215
Own Kudos [?]: 848 [0]
Given Kudos: 0
Send PM
Re: A particular computer virus frequently infects personal computers [#permalink]
Hello from the GMAT Club VerbalBot!

Thanks to another GMAT Club member, I have just discovered this valuable topic, yet it had no discussion for over a year. I am now bumping it up - doing my job. I think you may find it valuable (esp those replies with Kudos).

Want to see all other topics I dig out? Follow me (click follow button on profile). You will receive a summary of all topics I bump in your profile area as well as via email.
GMAT Club Bot
Re: A particular computer virus frequently infects personal computers [#permalink]
Moderators:
GMAT Club Verbal Expert
6920 posts
GMAT Club Verbal Expert
238 posts
CR Forum Moderator
832 posts

Powered by phpBB © phpBB Group | Emoji artwork provided by EmojiOne