Last visit was: 22 Apr 2026, 21:08 It is currently 22 Apr 2026, 21:08
Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
User avatar
Kurtosis
User avatar
Current Student
Joined: 13 Apr 2015
Last visit: 10 Nov 2021
Posts: 1,384
Own Kudos:
5,235
 [11]
Given Kudos: 1,228
Location: India
Products:
Posts: 1,384
Kudos: 5,235
 [11]
2
Kudos
Add Kudos
9
Bookmarks
Bookmark this Post
Most Helpful Reply
User avatar
KarishmaB
Joined: 16 Oct 2010
Last visit: 21 Apr 2026
Posts: 16,439
Own Kudos:
79,389
 [5]
Given Kudos: 484
Location: Pune, India
Expert
Expert reply
Active GMAT Club Expert! Tag them with @ followed by their username for a faster response.
Posts: 16,439
Kudos: 79,389
 [5]
5
Kudos
Add Kudos
Bookmarks
Bookmark this Post
General Discussion
User avatar
deepthit
Joined: 24 Oct 2013
Last visit: 29 Apr 2023
Posts: 104
Own Kudos:
Given Kudos: 129
Location: India
Concentration: General Management, Strategy
WE:Information Technology (Computer Software)
Posts: 104
Kudos: 61
Kudos
Add Kudos
Bookmarks
Bookmark this Post
User avatar
Kurtosis
User avatar
Current Student
Joined: 13 Apr 2015
Last visit: 10 Nov 2021
Posts: 1,384
Own Kudos:
5,235
 [2]
Given Kudos: 1,228
Location: India
Products:
Posts: 1,384
Kudos: 5,235
 [2]
2
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Question Type: Complete the passage

Main Point: No virus detection \(\neq\) Virus installation blocked
Missing Info: The virus may be present in a disguised form

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective - Incorrect. Effectiveness of the virus is not disputed in the argument. Out of context.

B. the virus was able to replicate itself and then send itself to people in the victim's address book - Incorrect. Out of scope.

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active - Incorrect. Out of scope.

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool - Correct. If the virus disguised itself in the system as a virus removal tool then it it undetected.

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system. - Incorrect. Again this is not relevant to the main point.

Answer: D
User avatar
rever08
Joined: 21 Jul 2017
Last visit: 13 Jan 2020
Posts: 148
Own Kudos:
Given Kudos: 143
Location: India
Concentration: Social Entrepreneurship, Leadership
GMAT 1: 660 Q47 V34
GPA: 4
WE:Project Management (Education)
Products:
Kudos
Add Kudos
Bookmarks
Bookmark this Post
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

We need to find a reason to support the point. Only D fits in as it presents the alternate why the virus is not detected even when it's present.
avatar
rahul6019
Joined: 08 Jan 2013
Last visit: 21 Jan 2019
Posts: 66
Own Kudos:
71
 [1]
Given Kudos: 22
Posts: 66
Kudos: 71
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

Which of the following most logically completes the argument?

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective. OFS - this does not explain why virus is undetected

B. the virus was able to replicate itself and then send itself to people in the victim's address book. OFS - this does not explain why virus is undetected

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active. OFS - no reason why virus is undetected

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool. Correct

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system. OFS - no reason why virus is undetected
avatar
abhijeet4316
Joined: 09 Nov 2016
Last visit: 07 Jan 2019
Posts: 5
Given Kudos: 9
Posts: 5
Kudos: 0
Kudos
Add Kudos
Bookmarks
Bookmark this Post
D is the most relevant of all. so D should be answer
avatar
ishan95jaiswal
Joined: 16 Oct 2017
Last visit: 03 Dec 2018
Posts: 18
Own Kudos:
Given Kudos: 15
Posts: 18
Kudos: 37
Kudos
Add Kudos
Bookmarks
Bookmark this Post
abhijeet4316
D is the most relevant of all. so D should be answer

Yes, You are right!
Thanks for the explanation!
User avatar
zac123
Joined: 21 May 2017
Last visit: 12 Sep 2019
Posts: 51
Own Kudos:
114
 [1]
Given Kudos: 66
Location: India
GMAT 1: 660 Q49 V31
GMAT 1: 660 Q49 V31
Posts: 51
Kudos: 114
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Vyshak
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

Which of the following most logically completes the argument?

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective

B. the virus was able to replicate itself and then send itself to people in the victim's address book

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system.




A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective--- it can still be detected by virus scanning software ,wrong

B. the virus was able to replicate itself and then send itself to people in the victim's address book--- irrelevant

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active---incorrect

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool--- relevant

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system.[/quote]-- incorrect
User avatar
Bunuel
User avatar
Math Expert
Joined: 02 Sep 2009
Last visit: 22 Apr 2026
Posts: 109,754
Own Kudos:
Given Kudos: 105,823
Products:
Expert
Expert reply
Active GMAT Club Expert! Tag them with @ followed by their username for a faster response.
Posts: 109,754
Kudos: 810,691
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Vyshak
A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________.

Which of the following most logically completes the argument?

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective

B. the virus was able to replicate itself and then send itself to people in the victim's address book

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system.

OFFICIAL EXPLANATION:



Reading the question: We have seen a fill-in-the-blank question before, in "Auto Body." Such questions may be phrased with or without a printed line signifying the blank. As we discussed in Auto Body, what goes in the blank should be a logical continuation of the prompt. Logical tests tend not to be possible on this type of question, so we will rely on our filter, ideally a prediction.

Creating a filter: how can we predict what goes in the blank? It must not contradict what has come before and it should finish the expression of the idea. The key is that the virus is on the computer even though the scanning software hasn't detected it. We could imagine that there is a defect in the scanner, or an ingenious design to the virus. Note that you are not expected to know anything about IT security for this question. Critical Reasoning questions are designed not to require any outside knowledge. Outside knowledge may still be useful, inevitably, and that's why the questions cover a range of topics. We could decide on the prediction, "The virus has outsmarted the security systems," as our filter.

Applying the filter: Do any answer choices match our prediction? Choice (A) somewhat does, but rather vaguely. Choice (B) doesn't address why the virus wasn't detected. Choice (C) also doesn't seem to address why the virus wasn't detected, though we might be able to read something into the term "backdoor." Choice (D) would definitely constitute outsmarting the security system. Choice (E) involves outsmarting, but not in a way that would necessarily obscure detection. We're left with (D). We confirm the logic: the correct answer must give an explanation for how a virus might have gone undetected by security systems. Choice (D) is the only option. Choice (C) sounds close, but we presume that many viruses possess backdoors and are detected.

The correct answer is (D).
avatar
jaisonsunny77
Joined: 05 Jan 2019
Last visit: 25 Aug 2021
Posts: 457
Own Kudos:
Given Kudos: 28
Posts: 457
Kudos: 394
Kudos
Add Kudos
Bookmarks
Bookmark this Post
The conclusion: Even though the virus was not detected by the antivirus software, we cannot say that the computer was successful in blocking the installation of the virus.

We have been asked to strengthen the conclusion. So, let us find that answer choice that does strengthen the conclusion.

A. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective - we are concerned with the virus that spread through email. (A) does not make it clear whether modified version of this virus has been effective via email or via the whole internet domain. Hence, eliminate (A)

B. the virus was able to replicate itself and then send itself to people in the victim's address book - we are concerned with what happens to a particular computer once it gets infected by the virus. Knowing the fact that the virus has spread to 'other computers' does nothing to strengthen the conclusion drawn. Hence, eliminate (B).

C. even after the virus had stopped spreading, the backdoors created during the initial infections remained active - does this mean that these initial infections can still cause damage? can these initial infections be detected by the antivirus? (C) does not clearly strengthen the conclusion. hence, eliminate (C).

D. the virus was able to disable virus-scanning software and pose as a virus-removal tool - Okay. Now we know a reason why the antivirus was not able to pick up the virus. This strengthens the idea that 'the computer antivirus was not successful in detecting the virus'. Hence, (D) is the right answer choice.

E. the virus also altered the victim's operating system in a way that made it difficult to shutdown the computer without cutting off power to the system. - Irrelevant since it does not strengthen nor weaken the conclusion. Hence, eliminate (E).
User avatar
VerbalBot
User avatar
Non-Human User
Joined: 01 Oct 2013
Last visit: 04 Jan 2021
Posts: 19,418
Own Kudos:
Posts: 19,418
Kudos: 1,009
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Automated notice from GMAT Club VerbalBot:

A member just gave Kudos to this thread, showing it’s still useful. I’ve bumped it to the top so more people can benefit. Feel free to add your own questions or solutions.

This post was generated automatically.
Moderators:
GMAT Club Verbal Expert
7391 posts
499 posts
358 posts