Download PDF
Free download in PDF Computer Virus Objective Type Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams. These short solved questions or quizzes are provided by Gkseries.
(21)
Virus that fool a user into downloading and /or executing them by pretending to be useful applications are also sometimes called
[A]
Cracker
[B]
Trojan Horses
[C]
key logger
[D]
worm
(22)
Antivirus software is an example of
[A]
a security utility
[B]
an operating system
[C]
An office suite
[D]
business software
Answer: a security utility
(23)
….are often delivered to a PC through an email attachment & are often designed to do harm
[A]
E-mail messages
[B]
Portals
[C]
Spam
[D]
Viruses
(24)
….viruses are often transmitted by a floppy disk left in the floppy drive
[A]
Boot sector
[B]
Logic bomb
[C]
Trojan horse
[D]
Script
(25)
An anti virus is
[A]
application
[B]
computer
[C]
program code
[D]
company name
(26)
Which virus spread in application software ?
[A]
Anti virus
[B]
Macro virus
[C]
Boot virus
[D]
File virus
(27)
First boot sector virus is
[A]
Computed
[B]
Mind
[C]
Brain
[D]
Elk cloner
(28)
The first computer virus is
[A]
HARLIE
[B]
PARAM
[C]
The Famous
[D]
Creeper
(29)
What is the most common way to get a virus in your computer ‘s hard disk
[A]
By opening emails
[B]
By uploading pictures from mobile phones to the computer
[C]
By installing games from their CDROMS
[D]
None of the above
Answer: By opening emails
(30)
A computer virus is
[A]
A virus that affects health of human beings
[B]
A computer program that replicate itself
[C]
Both of the above
[D]
None of the above
Answer: A computer program that replicate itself
31
_______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
[A]
Payload
[B]
Spamming
[C]
Exploits
[D]
Scams
32
_________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
[A]
Keylogging
[B]
Spamming
[C]
Denial of service
[D]
Exploits
33
The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
[A]
Eavesdropping
[B]
Exploits
[C]
Scams
[D]
Denial of service
34
_________ are computer programs that are designed by attackers to gain root or administrative access to your computer.
[A]
Backdoors
[B]
Rootkits
[C]
Malware
[D]
Antiware
35
What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
[A]
Spyware
[B]
Antiware
[C]
Backdoors
[D]
Malware
Please share this page