JOIN ADRE 2.0 Telegram Group

Computer Virus Quiz | Computer Virus Objective Type Questions and Answers

Questions
21 Virus that fool a user into downloading and /or executing them by pretending to be useful applications are also sometimes called
A Cracker
B Trojan Horses
C key logger
D worm

Answer: Trojan Horses
22 Antivirus software is an example of
A a security utility
B an operating system
C An office suite
D business software

Answer: a security utility
23 ….are often delivered to a PC through an email attachment & are often designed to do harm
A E-mail messages
B Portals
C Spam
D Viruses

Answer: Viruses
24 ….viruses are often transmitted by a floppy disk left in the floppy drive
A Boot sector
B Logic bomb
C Trojan horse
D Script

Answer: Boot sector
25 An anti virus is
A application
B computer
C program code
D company name

Answer: program code
26 Which virus spread in application software ?
A Anti virus
B Macro virus
C Boot virus
D File virus

Answer: Macro virus
27 First boot sector virus is
A Computed
B Mind
C Brain
D Elk cloner

Answer: Brain
28 The first computer virus is
A HARLIE
B PARAM
C The Famous
D Creeper

Answer: Creeper
29 What is the most common way to get a virus in your computer ‘s hard disk
A By opening emails
B By uploading pictures from mobile phones to the computer
C By installing games from their CDROMS
D None of the above

Answer: By opening emails
30 A computer virus is
A A virus that affects health of human beings
B A computer program that replicate itself
C Both of the above
D None of the above

Answer: A computer program that replicate itself
31 _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
A Payload
B Spamming
C Exploits
D Scams

Answer: Payload
32 _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
A Keylogging
B Spamming
C Denial of service
D Exploits

Answer: Keylogging
33 The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
A Eavesdropping
B Exploits
C Scams
D Denial of service

Answer: Eavesdropping
34 _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.
A Backdoors
B Rootkits
C Malware
D Antiware

Answer: Rootkits
35 What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
A Spyware
B Antiware
C Backdoors
D Malware

Answer: Spyware

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series