Virus and Antivirus Practice Question and Answer

Q:

What is virus that spreads in computer?

423 0

  • 1
    It is hardware
    Correct
    Wrong
  • 2
    It is a computer program
    Correct
    Wrong
  • 3
    It is system software
    Correct
    Wrong
  • 4
    It is a windows tool
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "It is a computer program"
Explanation :

a virus that spreads in a computer is a type of malicious computer program. Computer viruses are software programs designed to replicate themselves and spread from one computer to another. They can attach themselves to legitimate programs or documents, and when the infected program or document is executed, the virus activates and starts spreading to other files and systems. Viruses can cause various harmful effects, such as corrupting or deleting files, stealing sensitive information, or disrupting computer operations. Antivirus software and best practices, such as avoiding suspicious downloads and email attachments, are used to protect computers from these malicious programs.

Q:

What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?

311 0

  • 1
    Computer virus
    Correct
    Wrong
  • 2
    Phishing Scams
    Correct
    Wrong
  • 3
    Spyware Scams
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Phishing Scams"
Explanation :

The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.


Q:

When does Time Bomb happen?

338 0

  • 1
    during a particular logic and data
    Correct
    Wrong
  • 2
    during a particular date or time
    Correct
    Wrong
  • 3
    during a particular time
    Correct
    Wrong
  • 4
    none of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "during a particular date or time"
Explanation :

it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.

Q:

Delayed payload of some virus is called-

539 0

  • 1
    Time
    Correct
    Wrong
  • 2
    Anti-virus
    Correct
    Wrong
  • 3
    Bomb
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Bomb"
Explanation :

 In the context of computer viruses or malware, a time bomb is a type of malicious code that is programmed to execute a harmful action at a specific date and time or after a certain period has elapsed. This delayed activation makes it challenging to detect and prevent the attack until it's too late.

Q:

Which computer virus records every movement you make on the computer?

839 1

  • 1
    Malware Android
    Correct
    Wrong
  • 2
    DoS
    Correct
    Wrong
  • 3
    Key Logger
    Correct
    Wrong
  • 4
    Trapper
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Key Logger "
Explanation :

A keylogger (short for keystroke logger) is a type of computer virus or malware that records every keystroke and movement made on a computer's keyboard, including sensitive information such as passwords, credit card numbers, and personal messages. It essentially captures the user's keystrokes without their knowledge and sends this information to the attacker, posing a significant security threat.

Q:

What is the name of those viruses which fool a user into downloading or executing them by pretending to be useful applications?

351 0

  • 1
    cracker
    Correct
    Wrong
  • 2
    Trojan horse
    Correct
    Wrong
  • 3
    worm
    Correct
    Wrong
  • 4
    key logger
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Trojan horse"

Q:

The virus that spreads in application software is called -

561 0

  • 1
    boot virus
    Correct
    Wrong
  • 2
    macro virus
    Correct
    Wrong
  • 3
    antivirus
    Correct
    Wrong
  • 4
    file virus
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "macro virus"

Q:

How does Le-Hard Virus come into existence?

1069 0

  • 1
    hardware
    Correct
    Wrong
  • 2
    Software
    Correct
    Wrong
  • 3
    command.com
    Correct
    Wrong
  • 4
    FRIDAY 13
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "command.com"

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully