MCQ on Virus and Antivirus. Computer security related objective Questions and answers with pdf for All competitive exams like JKSSB, GATE, SSC, RAILWAY, BANK, UPSC, IBPS, CHSL, MP Police etc.
MCQ on Virus and Antivirus
1. There are _________ types of computer virus.
a) 5
b) 7
c) 10
d) 12
Answer: c
2. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm
Ans. b
3. In which year Apple II virus came into existence?
a) 1979
b) 1980
c) 1981
d) 1982
Answer: c
4. The virus hides itself from getting detected by ______ different ways.
a) 2
b) 3
c) 4
d) 5
Answer: b
5. _______________ infects the master boot record and it is challenging and a complex task to remove this virus.
a) Boot Sector Virus
b) Polymorphic
c) Multipartite
d) Trojans
Answer: a
6. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.
a) Boot Sector Virus
b) Direct Action Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: b
7. ______________ infects the executables as well as the boot sectors.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: d
8. ______________ are difficult to identify as they keep on changing their type and signature.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: c
9. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection
Answer: d
10. The virus that spread in application software is called as
1. Boot virus
2. Macro virus
3. File virus
4. Anti virus
Ans. b
11. How does a Le-Hard virus come into existence?
1. Hardware
2. Software
3. FRIDAY 13
4. Command.Com
Ans. 4
12. What is the virus that spread in computer?
1. It is hardware
2. It is system software
3. It is a computer program
4. It is a windows tool
Ans. 3
13. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?
1. Computer viruses
2. Spyware scams
3. Phishing scams
4. None of the above
Ans. 3
14. When does the time bomb occur?
1. During a particular logic and data
2. During a particular time
3. During a particular data or time
4. None of the above
Ans. 3
15. Delayed payload of some viruses is also called as
1. Time
2. Bomb
3. Anti-virus
4. None of the above
Ans. 2
16. The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is the self replicating program called?
1. Keylogger
2. Cracker
3. Worm
4. All of the above
Ans. 3
17. What is anti-virus?
1. It is a computer
2. It is a program code
3. It is a company name
4. It is an application
Ans. 2
18. What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?
A Malware
B Spyware
C Backdoors
D Key-logger
Ans. a
19. Which of the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?
A Adware
B Spyware
C Malware
D Bots
Ans. a
20. Which of the following is a program capable of continually replicating with little or no user intervention?
A Worms
B Trojan horses
C Virus
D none of these
Ans. c
21. Which of the following is the type of software that has self-replicating software that causes damage to files and system?
A Worms
B Backdoors
C Viruses
D Trojan horses
Ans. a
22. Antivirus software is an example of
A a security utility
B an operating system
C An office suite
D business software
Ans. a
23 ….are often delivered to a PC through an email attachment & are often designed to do harm
A E-mail messages
B Portals
C Spam
D Viruses
Ans. d
24 ….viruses are often transmitted by a floppy disk left in the floppy drive
A Boot sector
B Logic bomb
C Trojan horse
D Script
Ans. a
25. What is the most common way to get a virus in your computer ‘s hard disk
A By opening emails
B By uploading pictures from mobile phones to the computer
C By installing games from their CDROMS
D None of the above
Ans. a
26. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
A Payload
B Spamming
C Exploits
D Scams
Ans. a
27. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
A Keylogging
B Spamming
C Denial of service
D Exploits
Ans. a
28. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
A Eavesdropping
B Exploits
C Scams
D Denial of service
Ans. a
29. _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.
A Backdoors
B Rootkits
C Malware
D Antiware
Ans. b
30. What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
A Spyware
B Antiware
C Backdoors
D Malware
Ans. a
31. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
A) Trojans
B) Viruses
C) Worm
D) Adware
E) Bots
Ans. a
32. Which of the following is harmful to the computer?
a) Shareware
b) antivirus
c) virus
d) freeware
Ans. c
33. Computer Virus is simply meaning is ____
a) hardware component
b) disease
c) set of computer instructions or code
d) type of bacteria
Ans. c
34. Virus enter the computer when computer starts is _____
a) salami shaving
b) macro
c) file infector
d) boot sector
Ans. d
35. Computer anti virus program includes ____ example of
a) Solomon Toolkit
b) Nortron
c) McAfee
d) All of these
Ans. d
36. Another name of computer virus is
a) vaccine
b) worm
c) Trojan Horse
d) DES
Ans. a
37. When computer virus starts to impact the data, it is known as
a) virus infection
b) virus spreading
c) data losing
d) shutting down
Ans. a
38. Another name for free computer software is
a) encrypted software
b) copy protected software
c) Public domain software
d) shareware
Ans. c
39. Which one is not a computer virus?
a) Trojan horse
b) logic bomb
c) McAfee
d) redlof
Ans. c
40. What is a software program that has the ability to replicate itself and spread from one computer to another called?
a) Computer virus
b) Computer memory
c) computer program
d) Computer file
Ans. a