Computer Virus Quiz | Computer Virus Objective Type Questions and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
21 Virus that fool a user into downloading and /or executing them by pretending to be useful applications are also sometimes called
A Cracker
B Trojan Horses
C key logger
D worm

Answer: Trojan Horses
22 Antivirus software is an example of
A a security utility
B an operating system
C An office suite
D business software

Answer: a security utility
23 ….are often delivered to a PC through an email attachment & are often designed to do harm
A E-mail messages
B Portals
C Spam
D Viruses

Answer: Viruses
24 ….viruses are often transmitted by a floppy disk left in the floppy drive
A Boot sector
B Logic bomb
C Trojan horse
D Script

Answer: Boot sector
25 An anti virus is
A application
B computer
C program code
D company name

Answer: program code
26 Which virus spread in application software ?
A Anti virus
B Macro virus
C Boot virus
D File virus

Answer: Macro virus
27 First boot sector virus is
A Computed
B Mind
C Brain
D Elk cloner

Answer: Brain
28 The first computer virus is
A HARLIE
B PARAM
C The Famous
D Creeper

Answer: Creeper
29 What is the most common way to get a virus in your computer ‘s hard disk
A By opening emails
B By uploading pictures from mobile phones to the computer
C By installing games from their CDROMS
D None of the above

Answer: By opening emails
30 A computer virus is
A A virus that affects health of human beings
B A computer program that replicate itself
C Both of the above
D None of the above

Answer: A computer program that replicate itself
31 _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
A Payload
B Spamming
C Exploits
D Scams

Answer: Payload
32 _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
A Keylogging
B Spamming
C Denial of service
D Exploits

Answer: Keylogging
33 The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
A Eavesdropping
B Exploits
C Scams
D Denial of service

Answer: Eavesdropping
34 _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.
A Backdoors
B Rootkits
C Malware
D Antiware

Answer: Rootkits
35 What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
A Spyware
B Antiware
C Backdoors
D Malware

Answer: Spyware
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series