MCQ on Virus and Antivirus [PDF] Computer Security Questions

MCQ on Virus and Antivirus. Computer security related objective Questions and answers with pdf for All competitive exams like JKSSB, GATE, SSC, RAILWAY, BANK, UPSC, IBPS, CHSL, MP Police etc.

MCQ on Virus and Antivirus

1. There are _________ types of computer virus.

a) 5

b) 7

c) 10

d) 12

Answer: c

2. A computer ________ is a malicious code which self-replicates by copying itself to other programs.

a) program

b) virus

c) application

d) worm

Ans. b

3. In which year Apple II virus came into existence?

a) 1979

b) 1980

c) 1981

d) 1982

Answer: c

4. The virus hides itself from getting detected by ______ different ways.

a) 2

b) 3

c) 4

d) 5

Answer: b

5. _______________ infects the master boot record and it is challenging and a complex task to remove this virus.

a) Boot Sector Virus

b) Polymorphic

c) Multipartite

d) Trojans

Answer: a

6. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.

a) Boot Sector Virus

b) Direct Action Virus

c) Polymorphic Virus

d) Multipartite Virus

Answer: b

7. ______________ infects the executables as well as the boot sectors.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

Answer: d

8. ______________ are difficult to identify as they keep on changing their type and signature.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

Answer: c

9. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?

a) Research purpose

b) Pranks

c) Identity theft

d) Protection

Answer: d

10. The virus that spread in application software is called as

1. Boot virus

2. Macro virus

3. File virus

4. Anti virus

Ans. b

11. How does a Le-Hard virus come into existence?

1. Hardware               

2. Software

3. FRIDAY 13              

4. Command.Com

Ans. 4

12. What is the virus that spread in computer?

1. It is hardware

2. It is system software

3. It is a computer program

4. It is a windows tool

Ans. 3

13. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity?

1. Computer viruses

2. Spyware scams

3. Phishing scams

4. None of the above

Ans. 3

14. When does the time bomb occur?

1. During a particular logic and data

2. During a particular time

3. During a particular data or time

4. None of the above

Ans. 3

15. Delayed payload of some viruses is also called as

1. Time

2. Bomb

3. Anti-virus

4. None of the above

Ans. 2

16. The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is the self replicating program called?

1. Keylogger

2. Cracker

3. Worm

4. All of the above

Ans. 3

17. What is anti-virus?

1. It is a computer

2. It is a program code

3. It is a company name

4. It is an application

Ans. 2

18.  What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?

A Malware                 

B Spyware

C Backdoors               

D Key-logger

Ans. a

19.  Which of the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?

A Adware

B Spyware

C Malware

D Bots

Ans. a

20.  Which of the following is a program capable of continually replicating with little or no user intervention?

A Worms

B Trojan horses

C Virus

D none of these

Ans. c

21. Which of the following is the type of software that has self-replicating software that causes damage to files and system?

A Worms

B Backdoors

C Viruses

D Trojan horses

Ans. a

22.  Antivirus software is an example of

A a security utility

B an operating system

C An office suite

D business software

Ans. a

23 ….are often delivered to a PC through an email attachment & are often designed to do harm

A E-mail messages

B Portals

C Spam

D Viruses

Ans. d

24 ….viruses are often transmitted by a floppy disk left in the floppy drive

A Boot sector             

B Logic bomb

C Trojan horse                       

D Script

Ans. a

25. What is the most common way to get a virus in your computer ‘s hard disk

A By opening emails

B By uploading pictures from mobile phones to the computer

C By installing games from their CDROMS

D None of the above

Ans. a

26. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.

A Payload

B Spamming

C Exploits

D Scams

Ans. a

27. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

A Keylogging

B Spamming

C Denial of service

D Exploits

Ans. a

28. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____

A Eavesdropping

B Exploits

C Scams

D Denial of service

Ans. a

29. _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.

A Backdoors

B Rootkits

C Malware

D Antiware

Ans. b

30. What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?

A Spyware

B Antiware

C Backdoors

D Malware

Ans. a

31. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.

A) Trojans

B) Viruses

C) Worm

D) Adware

E) Bots

Ans. a

32. Which of the following is harmful to the computer?

a) Shareware

b) antivirus

c) virus

d) freeware

Ans. c

33. Computer Virus is simply meaning is ____

a) hardware component

b) disease

c) set of computer instructions or code

d) type of bacteria

Ans. c

34. Virus enter the computer when computer starts is _____

a) salami shaving

b) macro

c) file infector

d) boot sector

Ans. d

35. Computer anti virus program includes ____ example of

a) Solomon Toolkit

b) Nortron

c) McAfee

d) All of these

Ans. d

36. Another name of computer virus is

a) vaccine

b) worm

c) Trojan Horse

d) DES

Ans. a

37. When computer virus starts to impact the data, it is known as

a) virus infection

b) virus spreading

c) data losing

d) shutting down

Ans. a

38. Another name for free computer software is

a) encrypted software

b) copy protected software

c) Public domain software

d) shareware

Ans. c

39. Which one is not a computer virus?

a) Trojan horse

b) logic bomb

c) McAfee

d) redlof

Ans. c

40. What is a software program that has the ability to replicate itself and spread from one computer to another called?

a) Computer virus

b) Computer memory

c) computer program

d) Computer file

Ans. a

MCQ on virus and antivirus [PDF Download] 65 Question
Computer Security MCQ PDF
Computer GK [10000 MCQ PDF] Questions for Competitive Exams