SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Virus and Antivirus Related Question for All Competitive Exams
1. There are _________ types of computer virus.
a) 5
b) 7
c) 10
d) 12
Answer: c
Explanation: There are a total of 10 types of virus. These are categorized based on their working and
characteristics. These are System or Boot Sector Virus, Direct Action Virus, Resident Virus, Multipartite
Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro Virus, Rootkit virus.
2. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm
Ans. b
3. In which year Apple II virus came into existence?
a) 1979
b) 1980
c) 1981
d) 1982
Answer: c
Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into existence. It
was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk.
4. The virus hides itself from getting detected by ______ different ways.
a) 2
b) 3
c) 4
d) 5
Answer: b
Explanation: The virus hides itself from getting detected in three different ways. These are by encrypting
itself, by altering the disk directory with additional virus bytes or it uses stealth algorithm to redirect disk
data.
5. _______________ infects the master boot record and it is challenging and a complex task to remove this
virus.
a) Boot Sector Virus
b) Polymorphic
c) Multipartite
d) Trojans
Answer: a
Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task to
remove such virus. Mostly such virus spreads through removable devices.
6. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the
specific type of files which it infects.
a) Boot Sector Virus
b) Direct Action Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: b
Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such type of
virus stays involved to the specific type of files which it infects.
7. ______________ infects the executables as well as the boot sectors.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: d
Explanation: Multipartite Virus infects the executables as well as the boot sectors. It infects the computer
or get into any system through multiple mediums and are hard to remove.
8. ______________ are difficult to identify as they keep on changing their type and signature.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: c
Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and signature.
They’re not easily detectable by traditional antivirus. It usually changes the signature pattern whenever it
replicates itself.
9. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection
Answer: d
Explanation: Computer virus is not created for protection. Virus writers may have other reasons like for
research purpose, pranks, vandalism, financial gain, identity theft, and some other malicious purposes.
10. The virus that spread in application software is called as
1. Boot virus
2. Macro virus
3. File virus
4. Anti virus
Ans. b
11. How does a Le-Hard virus come into existence?
1. Hardware 2. Software
3. FRIDAY 13 4. Command.Com
Ans. 4
12. What is the virus that spread in computer?
1. It is hardware
2. It is system software
3. It is a computer program
4. It is a windows tool
Ans. 3
13. What kind of attempts is made by individuals to obtain confidential information from a person by
falsifying their identity?
1. Computer viruses
2. Spyware scams
3. Phishing scams
4. None of the above
Ans. 3
14. When does the time bomb occur?
1. During a particular logic and data
2. During a particular time
3. During a particular data or time
4. None of the above
Ans. 3
15. Delayed payload of some viruses is also called as
1. Time
2. Bomb
3. Anti-virus
4. None of the above
Ans. 2
16. The difference between a virus and a self-replicating program which is like a virus is that rather than
creating copies of itself on only one system it propagate through computer network. What is the self
replicating program called?
1. Keylogger
2. Cracker
3. Worm
4. All of the above
Ans. 3
17. What is anti-virus?
1. It is a computer
2. It is a program code
3. It is a company name
4. It is an application
Ans. 2
18. What is the software called that’s designed to exploit a computer user and is a broad term covering
computer viruses, worms, Trojan, adware, etc.?
A Malware B Spyware
C Backdoors D Key-logger
Ans. a
19. Which of the following is a software that, once installed on your computer, tracks your internet
browsing habits and sends you popups containing advertisements related to the sites and topics you’ve
visited?
A Adware
B Spyware
C Malware
D Bots
Ans. a
20. Which of the following is a program capable of continually replicating with little or no user
intervention?
A Worms
B Trojan horses
C Virus
D none of these
Ans. c
21. Which of the following is the type of software that has self-replicating software that causes damage to
files and system?
A Worms
B Backdoors
C Viruses
D Trojan horses
Ans. a
22. Antivirus software is an example of
A a security utility
B an operating system
C An office suite
D business software
Ans. a
23 ….are often delivered to a PC through an email attachment & are often designed to do harm
A E-mail messages
B Portals
C Spam
D Viruses
Ans. d
24 ….viruses are often transmitted by a floppy disk left in the floppy drive
A Boot sector B Logic bomb
C Trojan horse D Script
Ans. a
25. What is the most common way to get a virus in your computer ‘s hard disk
A By opening emails
B By uploading pictures from mobile phones to the computer
C By installing games from their CDROMS
D None of the above
Ans. a
26. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting
data, sending spam or encrypting data.
A Payload
B Spamming
C Exploits
D Scams
Ans. a
27. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the
person using the keyboard is unaware that their actions are being monitored.
A Keylogging
B Spamming
C Denial of service
D Exploits
Ans. a
28. The attack that focuses on capturing small packets from the network transmitted by other computers
and reading the data content in search of any type of information is ____
A Eavesdropping
B Exploits
C Scams
D Denial of service
Ans. a
29. _________ are computer programs that are designed by attackers to gain root or administrative access
to your computer.
A Backdoors
B Rootkits
C Malware
D Antiware
Ans. b
30. What is the software called which when get downloaded on computer scans your hard drive for
personal information and your internet browsing habits?
A Spyware
B Antiware
C Backdoors
D Malware
Ans. a
31. Which of the following is a type of program that either pretends to have, or is described as having, a set
of useful or desirable features but actually contains damaging code.
A) Trojans
B) Viruses
C) Worm
D) Adware
E) Bots
Ans. a
32. Which of the following is harmful to the computer?
a) Shareware
b) antivirus
c) virus
d) freeware
Ans. c
33. Computer Virus is simply meaning is ____
a) hardware component
b) disease
c) set of computer instructions or code
d) type of bacteria
Ans. c
34. Virus enter the computer when computer starts is _____
a) salami shaving
b) macro
c) file infector
d) boot sector
Ans. d
35. Computer anti virus program includes ____ example of
a) Solomon Toolkit
b) Nortron
c) McAfee
d) All of these
Ans. d
36. Another name of computer virus is
a) vaccine
b) worm
c) Trojan Horse
d) DES
Ans. a
37. When computer virus starts to impact the data, it is known as
a) virus infection
b) virus spreading
c) data losing
d) shutting down
Ans. a
38. Another name for free computer software is
a) encrypted software
b) copy protected software
c) Public domain software
d) shareware
Ans. c
39. Which one is not a computer virus?
a) Trojan horse
b) logic bomb
c) McAfee
d) redlof
Ans. c
40. What is a software program that has the ability to replicate itself and spread from one computer to
another called?
a) Computer virus
b) Computer memory
c) computer program
d) Computer file
Ans. a
41. Which of the following is the first PC virus detected on ARPANET in 1970s?
a) Michelangelo virus
b) Brain
c) Creeper
d) Carzy.A
Ans. c
42. A computer virus can ____.
a) damage data
b) render the system slow
c) copy without any knowledge onto floppies used in infected computer
d) All the above
Ans. d
43. Virus in computers is related to ___.
a) dust particles
b) hardware
c) programs
d) All of these
Ans. c
44. If your file is infected by a virus and you are sending that infected file to your friend through e-mail,
what happens to your friend’s computer?
a) It will be infected by the virus
b) It will not get affected by the virus
c) My friend cannot receive the file through e-mail
d) You cannot send file through e-mail
Ans. a
45. How is a virus transmitted in a computer?
a) Booting a PC from an infected medium
b) Executing an infected program
c) Opening an infected file
d) All the above
Ans. d
46. Which type of virus infects .SCR, .SYS files?
a) Program virus
b) Boot virus
c) Macro virus
d) Creeper virus
Ans. a
47. The viruses that change their appearance to avoid detection are called ___.
a) MBR viruses
b) DBR viruses
c) Parasitic viruses
d) Polymorphic viruses
Ans. d
48. Acid rain, Trojan and Amoeba. A are examples of _____.
a) program viruses
b) boot viruses
c) macro viruses
d) All of these
Ans. a
49. Which of the following is an example of a boot virus?
a) Alien.298
b) Umbrella.3173
c) Devil.941
d) XM.Yohimbe.A
Ans. c
50. In which of the following files can viruses be sent as email attachments?
a) .exe, .corn
b) .pif, .scr
c) .vbs, .bat
d) All of these
Ans. d
51. Which of the following is used to detect and remove virus from a computer?
a) Virus software
b) Antivirus software
c) Application software
d) System software
Ans. b
52. Which is the product of Symantec corporation?
a) Nortron antivirus
b) McAfee
c) Avast antivirus
d) Kaspersky antivirus
Ans. a
53. Which of the following areas does an antivirus check for a virus?
a) boot records
b) Programs
c) All local hard drives
d) All of these
Ans. d
54. Which of the following is performed by an antivirus software on a virus infected file ?
a) Repairs the infected file
b) Deletes the infected file
c) Quarantines the infected file
d) All the above
Ans. d
55. Which kind of virus attaches itself to the antivirus program?
a) self modifying virus
b) Stealth virus
c) Boot sector virus
d) Micro virus
Ans. b
56. Which software was developed by Natalya Kasperskaya in 1997?
a) Nortron antivirus
b) Avast antivirus
c) McAfee antivirus
d) Kaspersky antivirus
Ans. d
1. Which of the following is not a type of virus?
a) Boot sector
b) Polymorphic
c) Multipartite
d) Trojans
2. Which of them is not an ideal way of spreading the virus?
a) Infected website
b) Emails
c) Official Antivirus CDs
d) USBs
3. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.
a) Apple I
b) Apple II
c) Apple III
d) Apple Virus
4. Direct Action Virus is also known as ___________
a) Non-resident virus b) Boot Sector Virus
c) Polymorphic Virus d) Multipartite Virus
5. ____________ deletes all the files that it infects.
a) Non-resident virus b) Overwrite Virus
c) Polymorphic Virus d) Multipartite Virus
6. _____________ is also known as cavity virus.
a) Non-resident virus b) Overwrite Virus
c) Polymorphic Virus d) Space-filler Virus
7. What is “Trend Micro”?
1. It is anti-virus software 2. It is just a program
3. It is virus program 4. None of the above
8. What is the name of the viruses that fool a user into downloading and/or executing them by pretending
to be useful applications?
1. Cracker
2. Worm
3. Trojan horses
4. Keylogger
9. What is the first boot sector virus?
1. Brain
2. Mind
3. ELK cloner
4. None of the above.
10. What is the name of first computer virus?
1. The Famous
2. HARLIE
3. PARAM
4. Creeper
Click here for Answers
Computer Best MCQ Book in Just Rs.29/- [7000+ Question in English]
https://bharatskills.in/best-computer-mcq-book-for-competitive-exams/
Computer Best MCQ Book in Just Rs.25/- (2100+ Question in Hindi)
https://bharatskills.in/computer-mcq-book-in-hindi-pdf/
HEETSON
Telegram https://t.me/Heetson_Official
WhatsApp Channel
@heetsoniti

More Related Content

PDF
MS Word MCQ (Microsoft Office Related Question)
PDF
Computer Hardware MCQ Basic to Advanced Question
PDF
Computer Fundamental MCQ Most Important Question
PDF
MS Excel MCQ Questions and Answers (Microsoft Office)
PDF
Internet MCQ (Web Technology Questions and Answers)
PDF
Computer Software MCQ (Application Related Question)
PDF
Computer Generation Question Answer History MCQ
PDF
Email MCQ (Computer E-Mail Related Question)
MS Word MCQ (Microsoft Office Related Question)
Computer Hardware MCQ Basic to Advanced Question
Computer Fundamental MCQ Most Important Question
MS Excel MCQ Questions and Answers (Microsoft Office)
Internet MCQ (Web Technology Questions and Answers)
Computer Software MCQ (Application Related Question)
Computer Generation Question Answer History MCQ
Email MCQ (Computer E-Mail Related Question)

What's hot (20)

PDF
MS Access MCQ Questions (Microsoft Office)
PDF
Computer Basic Questions and answers MCQ
PDF
MS Windows MCQ (Microsoft Questions and Answers)
PDF
MS-Office-Questions-for-Compitition-exams.pdf
PDF
Computer Input and Output Device MCQ Question
PDF
Computer systems mcq
PDF
MS Excel Questions and Answers MCQ in Hindi
PDF
Computers basic mcq questions 3
PDF
COPA MS Word MCQ Important Question in Hindi
PDF
100 Computer MCQ.pdf
PDF
Computer Memory Questions and Answers (Storage MCQ)
PDF
COPA ITI MS Word MCQ Most Important Questions
PDF
DRDO Previous Year Computer Question (1000 MCQ)
PDF
Cyber Security MCQ Questions and Answers
PDF
Web Browser MCQ Questions and Answers (WWW Internet)
PDF
DBMS MCQ Questions with Answers in Hindi
PDF
Operating System Important MCQs in Hindi
PDF
ITI Training Officer COPA Previous Year Paper MCQ
PDF
Operating System MCQ (OS Most Important Question)
PDF
IT & ITeS Important MCQ Questions and Answers
MS Access MCQ Questions (Microsoft Office)
Computer Basic Questions and answers MCQ
MS Windows MCQ (Microsoft Questions and Answers)
MS-Office-Questions-for-Compitition-exams.pdf
Computer Input and Output Device MCQ Question
Computer systems mcq
MS Excel Questions and Answers MCQ in Hindi
Computers basic mcq questions 3
COPA MS Word MCQ Important Question in Hindi
100 Computer MCQ.pdf
Computer Memory Questions and Answers (Storage MCQ)
COPA ITI MS Word MCQ Most Important Questions
DRDO Previous Year Computer Question (1000 MCQ)
Cyber Security MCQ Questions and Answers
Web Browser MCQ Questions and Answers (WWW Internet)
DBMS MCQ Questions with Answers in Hindi
Operating System Important MCQs in Hindi
ITI Training Officer COPA Previous Year Paper MCQ
Operating System MCQ (OS Most Important Question)
IT & ITeS Important MCQ Questions and Answers
Ad

Similar to Computer Virus and Antivirus MCQ Question (20)

DOC
Web virus activity
PDF
2266 (1).pdf
PDF
mcq edu03 Anju 23.pdf
PDF
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
PPTX
2nd-quiz-in-ict.pptx
PPTX
Computer virus
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPT
Op Sy 03 Ch 61
PPT
Chapter 09
PPT
Malware
PPT
Zlob Trojan
PPTX
Computer Virus
DOC
Computer security and_privacy_tif_key
PPT
PPTX
cyber quiz ppt presentation of engineering
PPTX
Computer viruses and its advantages.pptx
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PDF
computer hardware ppt 2.pdf about hardware
PPT
Web virus activity
2266 (1).pdf
mcq edu03 Anju 23.pdf
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
2nd-quiz-in-ict.pptx
Computer virus
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Op Sy 03 Ch 61
Chapter 09
Malware
Zlob Trojan
Computer Virus
Computer security and_privacy_tif_key
cyber quiz ppt presentation of engineering
Computer viruses and its advantages.pptx
Computer Virus And Antivirus-Sumon Chakraborty
computer hardware ppt 2.pdf about hardware
Ad

More from SONU HEETSON (20)

PDF
Textile Mechatronics Question Paper MCQ ITI NIMI Question Bank Book Free
PDF
Mechanic Electric Vehicle Question Paper MCQ ITI NIMI EV Question Bank Book Free
PDF
Tool and Die Maker (Dies & Moulds) Question Paper MCQ ITI NIMI Question Bank...
PDF
Surveyor Question Paper MCQ ITI Surveying NIMI Question Bank Book Free
PDF
Surface Ornamentation Techniques (Embroidery) Question Paper MCQ ITI NIMI Que...
PDF
Steno Hindi Question Paper MCQ ITI Question Bank Book Free
PDF
Sheet Metal Worker Question Paper MCQ ITI NIMI Question Bank Book Free
PDF
Plastic Processing Operator Question Paper MCQ ITI NIMI Question Bank Book Free
PDF
Digital Photography MCQ Questions - Photographer Question Paper NIMI MCQ Book...
PDF
Photographer Question Paper MCQ ITI NIMI Question Bank Book Free
PDF
Tractor Mechanic Question Paper MCQ ITI NIMI Question Bank Book Free
PDF
Mechanic Machine Tool Maintenance Question Paper MCQ ITI NIMI Question Bank B...
PDF
Mason Building Constructor Question Paper MCQ ITI NIMI Question Bank Book
PDF
Machinist Grinder Question Paper MCQ ITI NIMI Question Bank Book PDF Free Dow...
PDF
Steno English Question Paper MCQ ITI NIMI Question Bank Book Free
PDF
Dress Making Question Paper ITI NIMI MCQ Book PDF Free Download
PDF
Interior Design and Decoration Question Paper ITI NIMI MCQ Book PDF Free Down...
PDF
Instrument Mechanic Question Paper ITI NIMI MCQ Book Free
PDF
Housekeeping Question Paper ITI NIMI Question Bank MCQ Book Free
PDF
Foundryman Question Paper ITI MCQ Book NIMI Question Bank Free
Textile Mechatronics Question Paper MCQ ITI NIMI Question Bank Book Free
Mechanic Electric Vehicle Question Paper MCQ ITI NIMI EV Question Bank Book Free
Tool and Die Maker (Dies & Moulds) Question Paper MCQ ITI NIMI Question Bank...
Surveyor Question Paper MCQ ITI Surveying NIMI Question Bank Book Free
Surface Ornamentation Techniques (Embroidery) Question Paper MCQ ITI NIMI Que...
Steno Hindi Question Paper MCQ ITI Question Bank Book Free
Sheet Metal Worker Question Paper MCQ ITI NIMI Question Bank Book Free
Plastic Processing Operator Question Paper MCQ ITI NIMI Question Bank Book Free
Digital Photography MCQ Questions - Photographer Question Paper NIMI MCQ Book...
Photographer Question Paper MCQ ITI NIMI Question Bank Book Free
Tractor Mechanic Question Paper MCQ ITI NIMI Question Bank Book Free
Mechanic Machine Tool Maintenance Question Paper MCQ ITI NIMI Question Bank B...
Mason Building Constructor Question Paper MCQ ITI NIMI Question Bank Book
Machinist Grinder Question Paper MCQ ITI NIMI Question Bank Book PDF Free Dow...
Steno English Question Paper MCQ ITI NIMI Question Bank Book Free
Dress Making Question Paper ITI NIMI MCQ Book PDF Free Download
Interior Design and Decoration Question Paper ITI NIMI MCQ Book PDF Free Down...
Instrument Mechanic Question Paper ITI NIMI MCQ Book Free
Housekeeping Question Paper ITI NIMI Question Bank MCQ Book Free
Foundryman Question Paper ITI MCQ Book NIMI Question Bank Free

Recently uploaded (20)

PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Trump Administration's workforce development strategy
PDF
1_English_Language_Set_2.pdf probationary
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Empowerment Technology for Senior High School Guide
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Introduction to pro and eukaryotes and differences.pptx
Weekly quiz Compilation Jan -July 25.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
Indian roads congress 037 - 2012 Flexible pavement
Chinmaya Tiranga quiz Grand Finale.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Trump Administration's workforce development strategy
1_English_Language_Set_2.pdf probationary
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Empowerment Technology for Senior High School Guide

Computer Virus and Antivirus MCQ Question

  • 1. Virus and Antivirus Related Question for All Competitive Exams 1. There are _________ types of computer virus. a) 5 b) 7 c) 10 d) 12 Answer: c Explanation: There are a total of 10 types of virus. These are categorized based on their working and characteristics. These are System or Boot Sector Virus, Direct Action Virus, Resident Virus, Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro Virus, Rootkit virus. 2. A computer ________ is a malicious code which self-replicates by copying itself to other programs. a) program b) virus c) application d) worm Ans. b 3. In which year Apple II virus came into existence? a) 1979 b) 1980 c) 1981 d) 1982 Answer: c Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into existence. It was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk. 4. The virus hides itself from getting detected by ______ different ways. a) 2 b) 3 c) 4 d) 5 Answer: b Explanation: The virus hides itself from getting detected in three different ways. These are by encrypting itself, by altering the disk directory with additional virus bytes or it uses stealth algorithm to redirect disk data. 5. _______________ infects the master boot record and it is challenging and a complex task to remove this virus. a) Boot Sector Virus b) Polymorphic c) Multipartite d) Trojans Answer: a Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task to remove such virus. Mostly such virus spreads through removable devices.
  • 2. 6. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects. a) Boot Sector Virus b) Direct Action Virus c) Polymorphic Virus d) Multipartite Virus Answer: b Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such type of virus stays involved to the specific type of files which it infects. 7. ______________ infects the executables as well as the boot sectors. a) Non-resident virus b) Boot Sector Virus c) Polymorphic Virus d) Multipartite Virus Answer: d Explanation: Multipartite Virus infects the executables as well as the boot sectors. It infects the computer or get into any system through multiple mediums and are hard to remove. 8. ______________ are difficult to identify as they keep on changing their type and signature. a) Non-resident virus b) Boot Sector Virus c) Polymorphic Virus d) Multipartite Virus Answer: c Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and signature. They’re not easily detectable by traditional antivirus. It usually changes the signature pattern whenever it replicates itself. 9. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus? a) Research purpose b) Pranks c) Identity theft d) Protection Answer: d Explanation: Computer virus is not created for protection. Virus writers may have other reasons like for research purpose, pranks, vandalism, financial gain, identity theft, and some other malicious purposes. 10. The virus that spread in application software is called as 1. Boot virus 2. Macro virus 3. File virus 4. Anti virus Ans. b 11. How does a Le-Hard virus come into existence? 1. Hardware 2. Software 3. FRIDAY 13 4. Command.Com Ans. 4
  • 3. 12. What is the virus that spread in computer? 1. It is hardware 2. It is system software 3. It is a computer program 4. It is a windows tool Ans. 3 13. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity? 1. Computer viruses 2. Spyware scams 3. Phishing scams 4. None of the above Ans. 3 14. When does the time bomb occur? 1. During a particular logic and data 2. During a particular time 3. During a particular data or time 4. None of the above Ans. 3 15. Delayed payload of some viruses is also called as 1. Time 2. Bomb 3. Anti-virus 4. None of the above Ans. 2 16. The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is the self replicating program called? 1. Keylogger 2. Cracker 3. Worm 4. All of the above Ans. 3 17. What is anti-virus? 1. It is a computer 2. It is a program code 3. It is a company name 4. It is an application Ans. 2 18. What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.? A Malware B Spyware C Backdoors D Key-logger Ans. a
  • 4. 19. Which of the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited? A Adware B Spyware C Malware D Bots Ans. a 20. Which of the following is a program capable of continually replicating with little or no user intervention? A Worms B Trojan horses C Virus D none of these Ans. c 21. Which of the following is the type of software that has self-replicating software that causes damage to files and system? A Worms B Backdoors C Viruses D Trojan horses Ans. a 22. Antivirus software is an example of A a security utility B an operating system C An office suite D business software Ans. a 23 ….are often delivered to a PC through an email attachment & are often designed to do harm A E-mail messages B Portals C Spam D Viruses Ans. d 24 ….viruses are often transmitted by a floppy disk left in the floppy drive A Boot sector B Logic bomb C Trojan horse D Script Ans. a 25. What is the most common way to get a virus in your computer ‘s hard disk A By opening emails B By uploading pictures from mobile phones to the computer C By installing games from their CDROMS D None of the above Ans. a
  • 5. 26. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data. A Payload B Spamming C Exploits D Scams Ans. a 27. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. A Keylogging B Spamming C Denial of service D Exploits Ans. a 28. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____ A Eavesdropping B Exploits C Scams D Denial of service Ans. a 29. _________ are computer programs that are designed by attackers to gain root or administrative access to your computer. A Backdoors B Rootkits C Malware D Antiware Ans. b 30. What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits? A Spyware B Antiware C Backdoors D Malware Ans. a 31. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code. A) Trojans B) Viruses C) Worm D) Adware E) Bots Ans. a
  • 6. 32. Which of the following is harmful to the computer? a) Shareware b) antivirus c) virus d) freeware Ans. c 33. Computer Virus is simply meaning is ____ a) hardware component b) disease c) set of computer instructions or code d) type of bacteria Ans. c 34. Virus enter the computer when computer starts is _____ a) salami shaving b) macro c) file infector d) boot sector Ans. d 35. Computer anti virus program includes ____ example of a) Solomon Toolkit b) Nortron c) McAfee d) All of these Ans. d 36. Another name of computer virus is a) vaccine b) worm c) Trojan Horse d) DES Ans. a 37. When computer virus starts to impact the data, it is known as a) virus infection b) virus spreading c) data losing d) shutting down Ans. a 38. Another name for free computer software is a) encrypted software b) copy protected software c) Public domain software d) shareware Ans. c
  • 7. 39. Which one is not a computer virus? a) Trojan horse b) logic bomb c) McAfee d) redlof Ans. c 40. What is a software program that has the ability to replicate itself and spread from one computer to another called? a) Computer virus b) Computer memory c) computer program d) Computer file Ans. a 41. Which of the following is the first PC virus detected on ARPANET in 1970s? a) Michelangelo virus b) Brain c) Creeper d) Carzy.A Ans. c 42. A computer virus can ____. a) damage data b) render the system slow c) copy without any knowledge onto floppies used in infected computer d) All the above Ans. d 43. Virus in computers is related to ___. a) dust particles b) hardware c) programs d) All of these Ans. c 44. If your file is infected by a virus and you are sending that infected file to your friend through e-mail, what happens to your friend’s computer? a) It will be infected by the virus b) It will not get affected by the virus c) My friend cannot receive the file through e-mail d) You cannot send file through e-mail Ans. a 45. How is a virus transmitted in a computer? a) Booting a PC from an infected medium b) Executing an infected program c) Opening an infected file d) All the above Ans. d
  • 8. 46. Which type of virus infects .SCR, .SYS files? a) Program virus b) Boot virus c) Macro virus d) Creeper virus Ans. a 47. The viruses that change their appearance to avoid detection are called ___. a) MBR viruses b) DBR viruses c) Parasitic viruses d) Polymorphic viruses Ans. d 48. Acid rain, Trojan and Amoeba. A are examples of _____. a) program viruses b) boot viruses c) macro viruses d) All of these Ans. a 49. Which of the following is an example of a boot virus? a) Alien.298 b) Umbrella.3173 c) Devil.941 d) XM.Yohimbe.A Ans. c 50. In which of the following files can viruses be sent as email attachments? a) .exe, .corn b) .pif, .scr c) .vbs, .bat d) All of these Ans. d 51. Which of the following is used to detect and remove virus from a computer? a) Virus software b) Antivirus software c) Application software d) System software Ans. b 52. Which is the product of Symantec corporation? a) Nortron antivirus b) McAfee c) Avast antivirus d) Kaspersky antivirus Ans. a
  • 9. 53. Which of the following areas does an antivirus check for a virus? a) boot records b) Programs c) All local hard drives d) All of these Ans. d 54. Which of the following is performed by an antivirus software on a virus infected file ? a) Repairs the infected file b) Deletes the infected file c) Quarantines the infected file d) All the above Ans. d 55. Which kind of virus attaches itself to the antivirus program? a) self modifying virus b) Stealth virus c) Boot sector virus d) Micro virus Ans. b 56. Which software was developed by Natalya Kasperskaya in 1997? a) Nortron antivirus b) Avast antivirus c) McAfee antivirus d) Kaspersky antivirus Ans. d 1. Which of the following is not a type of virus? a) Boot sector b) Polymorphic c) Multipartite d) Trojans 2. Which of them is not an ideal way of spreading the virus? a) Infected website b) Emails c) Official Antivirus CDs d) USBs 3. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence. a) Apple I b) Apple II c) Apple III d) Apple Virus 4. Direct Action Virus is also known as ___________ a) Non-resident virus b) Boot Sector Virus c) Polymorphic Virus d) Multipartite Virus
  • 10. 5. ____________ deletes all the files that it infects. a) Non-resident virus b) Overwrite Virus c) Polymorphic Virus d) Multipartite Virus 6. _____________ is also known as cavity virus. a) Non-resident virus b) Overwrite Virus c) Polymorphic Virus d) Space-filler Virus 7. What is “Trend Micro”? 1. It is anti-virus software 2. It is just a program 3. It is virus program 4. None of the above 8. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications? 1. Cracker 2. Worm 3. Trojan horses 4. Keylogger 9. What is the first boot sector virus? 1. Brain 2. Mind 3. ELK cloner 4. None of the above. 10. What is the name of first computer virus? 1. The Famous 2. HARLIE 3. PARAM 4. Creeper Click here for Answers Computer Best MCQ Book in Just Rs.29/- [7000+ Question in English] https://bharatskills.in/best-computer-mcq-book-for-competitive-exams/ Computer Best MCQ Book in Just Rs.25/- (2100+ Question in Hindi) https://bharatskills.in/computer-mcq-book-in-hindi-pdf/ HEETSON Telegram https://t.me/Heetson_Official WhatsApp Channel @heetsoniti