Virus and Antivirus Questions Practice Question and Answer
8 Q: What is virus that spreads in computer?
831 063ecd3090fa4111f87e15c9e
63ecd3090fa4111f87e15c9e- 1It is hardwarefalse
- 2It is a computer programtrue
- 3It is system softwarefalse
- 4It is a windows toolfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "It is a computer program"
Explanation :
a virus that spreads in a computer is a type of malicious computer program. Computer viruses are software programs designed to replicate themselves and spread from one computer to another. They can attach themselves to legitimate programs or documents, and when the infected program or document is executed, the virus activates and starts spreading to other files and systems. Viruses can cause various harmful effects, such as corrupting or deleting files, stealing sensitive information, or disrupting computer operations. Antivirus software and best practices, such as avoiding suspicious downloads and email attachments, are used to protect computers from these malicious programs.
Q: What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?
651 063ecd35b0fa4111f87e15cb8
63ecd35b0fa4111f87e15cb8- 1Computer virusfalse
- 2Phishing Scamstrue
- 3Spyware Scamsfalse
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Phishing Scams"
Explanation :
The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.
Q: When does Time Bomb happen?
706 063ecd39e3c221e1b4dce5a32
63ecd39e3c221e1b4dce5a32- 1during a particular logic and datafalse
- 2during a particular date or timetrue
- 3during a particular timefalse
- 4none of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "during a particular date or time"
Explanation :
it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.
Q: Delayed payload of some virus is called-
1034 063ecd3f90fa4111f87e15e1b
63ecd3f90fa4111f87e15e1b- 1Timefalse
- 2Anti-virusfalse
- 3Bombtrue
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Bomb"
Explanation :
In the context of computer viruses or malware, a time bomb is a type of malicious code that is programmed to execute a harmful action at a specific date and time or after a certain period has elapsed. This delayed activation makes it challenging to detect and prevent the attack until it's too late.
Q: Which computer virus records every movement you make on the computer?
1839 163bfed2d74eba5069d5bfa4a
63bfed2d74eba5069d5bfa4a- 1Malware Androidfalse
- 2DoSfalse
- 3Key Loggertrue
- 4Trapperfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Key Logger "
Explanation :
A keylogger (short for keystroke logger) is a type of computer virus or malware that records every keystroke and movement made on a computer's keyboard, including sensitive information such as passwords, credit card numbers, and personal messages. It essentially captures the user's keystrokes without their knowledge and sends this information to the attacker, posing a significant security threat.
Q: What is the name of those viruses which fool a user into downloading or executing them by pretending to be useful applications?
664 063e62957e6cd351b75ec9ba5
63e62957e6cd351b75ec9ba5- 1crackerfalse
- 2Trojan horsetrue
- 3wormfalse
- 4key loggerfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Trojan horse"
Q: The virus that spreads in application software is called -
1010 063e628a1cc37d41b3f99b6fb
63e628a1cc37d41b3f99b6fb- 1boot virusfalse
- 2macro virustrue
- 3antivirusfalse
- 4file virusfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "macro virus"
Q: How does Le-Hard Virus come into existence?
1922 063e6283ee6cd351b75ec9996
63e6283ee6cd351b75ec9996- 1hardwarefalse
- 2Softwarefalse
- 3command.comtrue
- 4FRIDAY 13false
- Show Answer
- Workspace
- SingleChoice