Download PDF
Free download in PDF Computer Virus Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams. These short solved questions or quizzes are provided by Gkseries.
(1)
Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
[A]
Protection
[B]
Identity theft
[C]
Pranks
[D]
Research purpose
(2)
_____________ is also known as cavity virus.
[A]
Polymorphic Virus
[B]
Space-filler Virus
[C]
Overwrite Virus
[D]
Non-resident virus
Answer: Space-filler Virus
(3)
____________ deletes all the files that it infects.
[A]
Multipartite Virus
[B]
Polymorphic Virus
[C]
Overwrite Virus
[D]
Non-resident virus
(4)
______________ are difficult to identify as they keep on changing their type and signature.
[A]
Polymorphic Virus
[B]
Multipartite Virus
[C]
Boot Sector Virus
[D]
Non-resident virus
Answer: Polymorphic Virus
(5)
______________ infects the executables as well as the boot sectors.
[A]
Polymorphic Virus
[B]
Multipartite Virus
[C]
Boot Sector Virus
[D]
Non-resident virus
Answer: Multipartite Virus
(6)
Direct Action Virus is also known as ___________
[A]
Multipartite Virus
[B]
Non-resident virus
[C]
Polymorphic Virus
[D]
Boot Sector Virus
Answer: Non-resident virus
(7)
________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.
[A]
Direct Action Virus
[B]
Multipartite Virus
[C]
Polymorphic Virus
[D]
Boot Sector Virus
Answer: Direct Action Virus
(8)
_______________ infects the master boot record and it is challenging and a complex task to remove this virus.
[A]
Trojans
[B]
Polymorphic
[C]
Boot Sector Virus
[D]
Multipartite
Answer: Boot Sector Virus
(9)
The virus hides itself from getting detected by ______ different ways.
[A]
5
[B]
2
[C]
3
[D]
None of these
(10)
In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.
[A]
Apple II
[B]
Apple Virus
[C]
Apple III
[D]
Apple I
(11)
In which year Apple II virus came into existence?
[A]
1981
[B]
1982
[C]
1980
[D]
none of these
(12)
Which of them is not an ideal way of spreading the virus?
[A]
Official Antivirus CDs
[B]
USBs
[C]
Emails
[D]
Infected website
Answer: Official Antivirus CDs
(13)
A computer ________ is a malicious code which self-replicates by copying itself to other programs.
[A]
worm
[B]
program
[C]
virus
[D]
None of these
(14)
Which of the following is not a type of virus?
[A]
Multipartite
[B]
Trojans
[C]
Polymorphic
[D]
none of these
(15)
There are _________ types of computer virus.
[A]
10
[B]
12
[C]
5
[D]
None of above
(16)
What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?
[A]
Malware
[B]
Spyware
[C]
Backdoors
[D]
Key-logger
(17)
Which of the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?
[A]
Adware
[B]
Spyware
[C]
Malware
[D]
Bots
(18)
Which of the following is a program capable of continually replicating with little or no user intervention?
[A]
Worms
[B]
Trojan horses
[C]
Virus
[D]
none of these
(19)
Which of the following is the type of software that has self-replicating software that causes damage to files and system?
[A]
Worms
[B]
Backdoors
[C]
Viruses
[D]
Trojan horses
(20)
Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
[A]
Bots
[B]
Trojans
[C]
Adware
[D]
Viruses
Please share this page