Virus and Antivirus Questions Practice Question and Answer
8 Q: Which computer virus records every movement you make on the computer?
2144 163bfed2d74eba5069d5bfa4a
63bfed2d74eba5069d5bfa4a- 1Malware Androidfalse
- 2DoSfalse
- 3Key Loggertrue
- 4Trapperfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Key Logger "
Explanation :
A keylogger (short for keystroke logger) is a type of computer virus or malware that records every keystroke and movement made on a computer's keyboard, including sensitive information such as passwords, credit card numbers, and personal messages. It essentially captures the user's keystrokes without their knowledge and sends this information to the attacker, posing a significant security threat.
Q: How does Le-Hard Virus come into existence?
2129 063e6283ee6cd351b75ec9996
63e6283ee6cd351b75ec9996- 1hardwarefalse
- 2Softwarefalse
- 3command.comtrue
- 4FRIDAY 13false
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "command.com"
Q: What is Trend Micro?
1614 063e6103cc386f46a0a732c80
63e6103cc386f46a0a732c80- 1this anti-virus softwaretrue
- 2this is virus programfalse
- 3it's just a programfalse
- 4none of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "this anti-virus software"
Q: Delayed payload of some virus is called-
1188 063ecd3f90fa4111f87e15e1b
63ecd3f90fa4111f87e15e1b- 1Timefalse
- 2Anti-virusfalse
- 3Bombtrue
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Bomb"
Explanation :
In the context of computer viruses or malware, a time bomb is a type of malicious code that is programmed to execute a harmful action at a specific date and time or after a certain period has elapsed. This delayed activation makes it challenging to detect and prevent the attack until it's too late.
Q: The virus that spreads in application software is called -
1110 063e628a1cc37d41b3f99b6fb
63e628a1cc37d41b3f99b6fb- 1boot virusfalse
- 2macro virustrue
- 3antivirusfalse
- 4file virusfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "macro virus"
Q: What is virus that spreads in computer?
991 063ecd3090fa4111f87e15c9e
63ecd3090fa4111f87e15c9e- 1It is hardwarefalse
- 2It is a computer programtrue
- 3It is system softwarefalse
- 4It is a windows toolfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "It is a computer program"
Explanation :
a virus that spreads in a computer is a type of malicious computer program. Computer viruses are software programs designed to replicate themselves and spread from one computer to another. They can attach themselves to legitimate programs or documents, and when the infected program or document is executed, the virus activates and starts spreading to other files and systems. Viruses can cause various harmful effects, such as corrupting or deleting files, stealing sensitive information, or disrupting computer operations. Antivirus software and best practices, such as avoiding suspicious downloads and email attachments, are used to protect computers from these malicious programs.
Q: When does Time Bomb happen?
873 063ecd39e3c221e1b4dce5a32
63ecd39e3c221e1b4dce5a32- 1during a particular logic and datafalse
- 2during a particular date or timetrue
- 3during a particular timefalse
- 4none of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "during a particular date or time"
Explanation :
it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.
Q: What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?
790 063ecd35b0fa4111f87e15cb8
63ecd35b0fa4111f87e15cb8- 1Computer virusfalse
- 2Phishing Scamstrue
- 3Spyware Scamsfalse
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Phishing Scams"
Explanation :
The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.