Professional Documents
Culture Documents
Answer: B
2. To protect a computer from virus, you should install -------- in your computer.
A. antivirus B. disk defragmenter
C. disk cleanup D. backup wizard
Answer: A
Answer: D
4. MCAfee is an example of
A. Virus B. Quick Heal
C. Antivirus D. Photo Editing Software
Answer: C
5. A ------- is a computer program that can invade computer and perform a variety of functions
ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files)
A. Computer Virus B. Antivirus
C. Ms Word D. Ms Access
Answer: A
7. -------- are often delivered to a PC through an email attachment and are often designed to do harm.
A. Virus B. Email
C. Portals D. Spam
Answer: A
8. The altering of data so that it is not usable unless the changes are undone is
A. biometrics B. encryption
C. ergonomics D. compression
Answer: B
Answer: B
10. What is short for malicious software (is software designed to disrupt computer operation, gather
sensitive information, or gain unauthorized access to computer systems)?
A. Malisoft B. Malairasoft
C. Moleculewar D. Malware
Answer: D
Answer: D
12. Which of the following is/are threats for electronic payment systems?
A. Computer virus B. Computer worms
C. Trojan horse D. All of the above
Answer: D
13. A virus that migrates freely within a large population of unauthorized email user is called a -------
A. macro B. flame war
C. plagiarism D. worm
Answer: A
14. -------- are attempts by individuals to obtain confidential information from you to falsifying their
identity.
A. Phishing scams B. Phishing trips
C. Spyware scams D. Computer viruses
Answer: A
15. Authentication is
A. hard to assure identity of user on a remote B. insertion
system
C. modification D. none of the above
Answer: A
16. A -------- is a computer program that can replicate itself and spread from one computer to
another.
A. PenDrive B. Computer Virus
C. Mouse D. Antivurs
Answer: B
17. Which of the following virus overtake computer system, when it boots and destroy information?
A. Stealth virus B. Trojan
C. Boot infectors D. System infectors
Answer: A
Answer: B
Answer: A
Answer: C
21. Which of the following describes programs that can run independently travel from system to
system and disrupt computer communication?
A. Viruses B. Worm
C. Trojans D. Droppers
Answer: B
22. -------- software are programs that are installed onto your computer and can scan and remove
known viruses which you may have contracted.
A. Antivirus B. Adware
C. Keylogger D. Firmmware
Answer: A
Answer: D
24. Which of the following would most likely not be a symptom of a virus?
A. Existing program files and icons disappear B. The CD–ROM stops functioning
C. The web browser opens to an unusual home D. Odd message or images are displayed on the
page screen
Answer: B
25. …………….. are used in denial of service attacks, typically against targeted web sites.
A. Trojan horse B. Zombie
C. Worm D. Virus
Answer: B
26. Select the correct order for the different phases of virus execution. i) Propagation phase ii)
Dormant phase iii) Execution phase iv) Triggering phase
A. ii, i, iv and iii B. i, ii, iii, and iv
C. ii, iii, iv and i D. i, iii, ii and iv
Answer: A
27. A ………………… attaches itself to executable files and replicates, when the infected program is
executed, by finding other executable files to infect.
A. Macro Virus B. Stealth virus
C. Polymorphic Virus D. Parasitic Virus
Answer: D
28. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus
software.
A. Macro Virus B. Parasitic Virus
C. Stealth virus D. Polymorphic Virus
Answer: C
29. A …………………….. creates copies during replication that are functionally equivalent but have
distinctly different bit patterns.
A. Polymorphic Virus B. Boot Sector Virus
C. Macro Virus D. Parasitic Virus
Answer: A
30. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random
encryption, key to encrypt the remainder of the virus.
A. polymorphic engine B. multiple engine
C. mutual engine D. mutation engine
Answer: D
31. State whether the following statement is true. i) A macro virus is platform independent. ii) Macro
viruses infect documents, not executable portions of code.
A. i-only B. ii-only
C. Both i and ii D. Non i and ii
Answer: C
Answer: D
33. In …………….., the virus places an identical copy of itself into other programs or into certain
system areas on the disk.
A. Execution phase B. Dormant phase
C. Propagation phase D. Triggering phase
Answer: C
34. A ……………… is a program that secretly takes over another Internet-attached computer and then
uses that computer to launch attacks
A. Trap doors B. Zombie
C. Virus D. Worm
Answer: B
35. What is the name of the Act that governs internet usage in India?
A. The Internet consumption Act, 1998 B. The Information Technology Act, 2004
C. The IT Gazette of India Act, 2004 D. None of these
Answer: B
36. All of the following are examples of real security and privacy risks EXCEPT
A. Spam B. Hackers
C. Identity theft D. Viruses
Answer: A
Answer: B
38. You just got a new computer which has antivirus software already installed. Is it safe to use on
the internet immediately?
A. No B. Yes
C. Maybe D. All of the above
Answer: A
Answer: D
40. If you receive an email claiming to need your username and/or password, what should you do?
A. Report it as phishing/spam through your B. Delete the message
email provider
C. Reply to the message with your email and D. None
password
Answer: A
41. Both email attachments and downloaded files can spread malware.
A. True B. False
C. Maybe D. None
Answer: A
42. What is the best way to protect your information when you are away from your computer?
A. Lock the computer with a password B. Activate the screen saver
C. Turn the monitor off D. None
Answer: A
43. What is a firewall?
A. A program that protects against viruses. B. A wall that is reinforced and cannot catch on
fire.
C. A filter for an internet connection that D. None
monitors outgoing and incoming activity.
Answer: C
Answer: C
Answer: B
Answer: B
47. What is the name of the viruses that fool a user into downloading and/or executing them by
pretending to be useful applications?
A. Worm B. Cracker
C. Keylogger D. Trojan horses
Answer: D
Answer: B
Answer: C
Answer: B
51. What kind of attempts is made by individuals to obtain confidential information from a person by
falsifying their identity?
A. Phishing scams B. Computer viruses
C. Spyware scams D. None of the above
Answer: A
Answer: C
Answer: B
55. The difference between a virus and a self-replicating program which is like a virus is that rather
than creating copies of itself on only one system it propagate through computer network. What is th
A. Time Bomb B. Cracker
C. Keylogger D. Worm
Answer: D
Answer: A