Computer Virus Quiz | Computer Virus Objective Type Questions and Answers

(21) Virus that fool a user into downloading and /or executing them by pretending to be useful applications are also sometimes called
[A] Cracker
[B] Trojan Horses
[C] key logger
[D] worm
Answer: Trojan Horses
(22) Antivirus software is an example of
[A] a security utility
[B] an operating system
[C] An office suite
[D] business software
Answer: a security utility
(23) ….are often delivered to a PC through an email attachment & are often designed to do harm
[A] E-mail messages
[B] Portals
[C] Spam
[D] Viruses
Answer: Viruses
(24) ….viruses are often transmitted by a floppy disk left in the floppy drive
[A] Boot sector
[B] Logic bomb
[C] Trojan horse
[D] Script
Answer: Boot sector
(25) An anti virus is
[A] application
[B] computer
[C] program code
[D] company name
Answer: program code
(26) Which virus spread in application software ?
[A] Anti virus
[B] Macro virus
[C] Boot virus
[D] File virus
Answer: Macro virus
(27) First boot sector virus is
[A] Computed
[B] Mind
[C] Brain
[D] Elk cloner
Answer: Brain
(28) The first computer virus is
[A] HARLIE
[B] PARAM
[C] The Famous
[D] Creeper
Answer: Creeper
(29) What is the most common way to get a virus in your computer ‘s hard disk
[A] By opening emails
[B] By uploading pictures from mobile phones to the computer
[C] By installing games from their CDROMS
[D] None of the above
Answer: By opening emails
(30) A computer virus is
[A] A virus that affects health of human beings
[B] A computer program that replicate itself
[C] Both of the above
[D] None of the above
Answer: A computer program that replicate itself
31 _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
[A] Payload
[B] Spamming
[C] Exploits
[D] Scams
Answer: Payload
32 _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
[A] Keylogging
[B] Spamming
[C] Denial of service
[D] Exploits
Answer: Keylogging
33 The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
[A] Eavesdropping
[B] Exploits
[C] Scams
[D] Denial of service
Answer: Eavesdropping
34 _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.
[A] Backdoors
[B] Rootkits
[C] Malware
[D] Antiware
Answer: Rootkits
35 What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
[A] Spyware
[B] Antiware
[C] Backdoors
[D] Malware
Answer: Spyware

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!