You are on page 1of 11

1.

The first computer virus is --------


A. Sasser B. Creeper
C. Blaster D. I Love You

Answer: B

2. To protect a computer from virus, you should install -------- in your computer.
A. antivirus B. disk defragmenter
C. disk cleanup D. backup wizard

Answer: A

3. Which of the following is known as Malicious software?


A. maliciousware B. illegalware
C. badware D. malware

Answer: D

4. MCAfee is an example of
A. Virus B. Quick Heal
C. Antivirus D. Photo Editing Software

Answer: C

5. A ------- is a computer program that can invade computer and perform a variety of functions
ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files)
A. Computer Virus B. Antivirus
C. Ms Word D. Ms Access

Answer: A

6. When a logic bomb is activated by a time related event, it is known as -------


A. trojan horse B. time bomb
C. virus D. time related bomb sequence
Answer: B

7. -------- are often delivered to a PC through an email attachment and are often designed to do harm.
A. Virus B. Email
C. Portals D. Spam

Answer: A

8. The altering of data so that it is not usable unless the changes are undone is
A. biometrics B. encryption
C. ergonomics D. compression

Answer: B

9. VIRUS stands for


A. Very Intelligent Result Until Source B. Vital Information Resource Under Slege
C. Viral Important Record User Searched D. Very Interchanged Resource Under Search

Answer: B

10. What is short for malicious software (is software designed to disrupt computer operation, gather
sensitive information, or gain unauthorized access to computer systems)?
A. Malisoft B. Malairasoft
C. Moleculewar D. Malware

Answer: D

11. Which of the following is not an antivirus software?


A. AVG B. Avast
C. MCAfee D. Code Red

Answer: D

12. Which of the following is/are threats for electronic payment systems?
A. Computer virus B. Computer worms
C. Trojan horse D. All of the above

Answer: D

13. A virus that migrates freely within a large population of unauthorized email user is called a -------
A. macro B. flame war
C. plagiarism D. worm

Answer: A

14. -------- are attempts by individuals to obtain confidential information from you to falsifying their
identity.
A. Phishing scams B. Phishing trips
C. Spyware scams D. Computer viruses

Answer: A

15. Authentication is
A. hard to assure identity of user on a remote B. insertion
system
C. modification D. none of the above

Answer: A

16. A -------- is a computer program that can replicate itself and spread from one computer to
another.
A. PenDrive B. Computer Virus
C. Mouse D. Antivurs

Answer: B

17. Which of the following virus overtake computer system, when it boots and destroy information?
A. Stealth virus B. Trojan
C. Boot infectors D. System infectors

Answer: A

18. Key logger is a


A. Antivirus B. Spyware
C. Firmware D. All of the above

Answer: B

19. To protect yourself from computer hacker, you should turn on a


A. Firewall B. Script
C. Antivirus D. VLC

Answer: A

20. Firewalls are used to protect against --------


A. virus attacks B. fire attacks
C. unauthorised access D. data driven attacks

Answer: C

21. Which of the following describes programs that can run independently travel from system to
system and disrupt computer communication?
A. Viruses B. Worm
C. Trojans D. Droppers

Answer: B

22. -------- software are programs that are installed onto your computer and can scan and remove
known viruses which you may have contracted.
A. Antivirus B. Adware
C. Keylogger D. Firmmware
Answer: A

23. Code red is a(n) ----------


A. Word Processing Software B. Photo Editing Software
C. Antivirus D. Virus

Answer: D

24. Which of the following would most likely not be a symptom of a virus?
A. Existing program files and icons disappear B. The CD–ROM stops functioning
C. The web browser opens to an unusual home D. Odd message or images are displayed on the
page screen

Answer: B

25. …………….. are used in denial of service attacks, typically against targeted web sites.
A. Trojan horse B. Zombie
C. Worm D. Virus

Answer: B

26. Select the correct order for the different phases of virus execution. i) Propagation phase ii)
Dormant phase iii) Execution phase iv) Triggering phase
A. ii, i, iv and iii B. i, ii, iii, and iv
C. ii, iii, iv and i D. i, iii, ii and iv

Answer: A

27. A ………………… attaches itself to executable files and replicates, when the infected program is
executed, by finding other executable files to infect.
A. Macro Virus B. Stealth virus
C. Polymorphic Virus D. Parasitic Virus

Answer: D
28. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus
software.
A. Macro Virus B. Parasitic Virus
C. Stealth virus D. Polymorphic Virus

Answer: C

29. A …………………….. creates copies during replication that are functionally equivalent but have
distinctly different bit patterns.
A. Polymorphic Virus B. Boot Sector Virus
C. Macro Virus D. Parasitic Virus

Answer: A

30. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random
encryption, key to encrypt the remainder of the virus.
A. polymorphic engine B. multiple engine
C. mutual engine D. mutation engine

Answer: D

31. State whether the following statement is true. i) A macro virus is platform independent. ii) Macro
viruses infect documents, not executable portions of code.
A. i-only B. ii-only
C. Both i and ii D. Non i and ii

Answer: C

32. The type(s) of auto executing macros, in Microsoft word is/are


A. Command macro B. Auto macro
C. Auto execute D. All of the above

Answer: D
33. In …………….., the virus places an identical copy of itself into other programs or into certain
system areas on the disk.
A. Execution phase B. Dormant phase
C. Propagation phase D. Triggering phase

Answer: C

34. A ……………… is a program that secretly takes over another Internet-attached computer and then
uses that computer to launch attacks
A. Trap doors B. Zombie
C. Virus D. Worm

Answer: B

35. What is the name of the Act that governs internet usage in India?
A. The Internet consumption Act, 1998 B. The Information Technology Act, 2004
C. The IT Gazette of India Act, 2004 D. None of these

Answer: B

36. All of the following are examples of real security and privacy risks EXCEPT
A. Spam B. Hackers
C. Identity theft D. Viruses

Answer: A

37. A worm is...


A. A slimy pink thing that lives in dirt B. Pieces of malicious code that make copies of
themselves and spread through computers
without human interaction.
C. An unsolicited email message. D. None

Answer: B
38. You just got a new computer which has antivirus software already installed. Is it safe to use on
the internet immediately?
A. No B. Yes
C. Maybe D. All of the above

Answer: A

39. Why might someone break into (hack) your computer?


A. They don't like you B. To commit a crime
C. To use it to distribute porn, malcious D. All of the above
programs, etc.

Answer: D

40. If you receive an email claiming to need your username and/or password, what should you do?
A. Report it as phishing/spam through your B. Delete the message
email provider
C. Reply to the message with your email and D. None
password

Answer: A

41. Both email attachments and downloaded files can spread malware.
A. True B. False
C. Maybe D. None

Answer: A

42. What is the best way to protect your information when you are away from your computer?
A. Lock the computer with a password B. Activate the screen saver
C. Turn the monitor off D. None

Answer: A
43. What is a firewall?
A. A program that protects against viruses. B. A wall that is reinforced and cannot catch on
fire.
C. A filter for an internet connection that D. None
monitors outgoing and incoming activity.

Answer: C

44. A strong password should contain:


A. Both uppercase and lowercase letters. B. A word that is easy to remember, such as the
name of a pet.
C. At least 8 characters, and a combination of D. None
letters, numbers, and characters.

Answer: C

45. Social engineering is:


A. A website created for people who share B. Scams distributed through email such as
common interests. phishing, pharming and impersonation.
C. A targeted attack on a personal computer. D. None

Answer: B

46. What is “Trend Micro”?


A. It is virus program B. It is anti-virus software
C. It is just a program D. None of the above

Answer: B

47. What is the name of the viruses that fool a user into downloading and/or executing them by
pretending to be useful applications?
A. Worm B. Cracker
C. Keylogger D. Trojan horses

Answer: D

48. The virus that spread in application software is called as


A. Boot virus B. Macro virus
C. Anti virus D. File virus

Answer: B

49. How does a Le-Hard virus come into existence?


A. Software B. Hardware
C. Command.Com D. FRIDAY 13

Answer: C

50. What is the virus that spread in computer?


A. It is system software B. It is a computer program
C. It is a windows tool D. It is hardware

Answer: B

51. What kind of attempts is made by individuals to obtain confidential information from a person by
falsifying their identity?
A. Phishing scams B. Computer viruses
C. Spyware scams D. None of the above

Answer: A

52. When does the time bomb occur?


A. During a particular time B. During a particular logic and data
C. During a particular data or time D. None of the above

Answer: C

53. Delayed payload of some viruses is also called as


A. Bomb B. Time
C. Anti-virus D. None of the above
Answer: A

54. What is the first boot sector virus?


A. Mind B. Brain
C. ELK cloner D. None of the above.

Answer: B

55. The difference between a virus and a self-replicating program which is like a virus is that rather
than creating copies of itself on only one system it propagate through computer network. What is th
A. Time Bomb B. Cracker
C. Keylogger D. Worm

Answer: D

56. What is anti-virus?


A. It is a program code B. It is a company name
C. It is a computer D. It is an application

Answer: A

You might also like