MCQs on Viruses and Computer Security

1. Which antivirus is harmful to the computer?
A) Shareware
B) Anti virus
C) Virus
D) Freeware
E) All of these
F) None of these

Answer: C) Virus

2. What is a computer virus?
a) A hardware component
b) A type of antivirus software
c) A malicious software that infects other files
d) A computer programming language

Answer: c) A malicious software that infects other files

3. A polymorphic virus can ______.
a) Spread through social media platforms
b) Change its appearance
c) Delete files randomly
d) Only infect specific file types

Answer: b) Change its appearance

4. How do viruses typically spread?
a) Through physical contact with infected computers
b) Via infected email attachments, websites, or removable media
c) Only through software downloads from official sources
d) By manipulating computer hardware

Answer: b) Via infected email attachments, websites, or removable media

5. Which type of virus hides within another legitimate program?
a) Worm
b) Trojan horse
c) Macro virus
d) Spyware

Answer: b) Trojan horse

6. What does a rootkit virus typically do?
a) Encrypts files and demands ransom
b) Monitors and hides its presence on a system
c) Spreads through infected email attachments
d) Disables the antivirus software

Answer: b) Monitors and hides its presence on a system

7. What is the purpose of a logic bomb?
a) Stealing passwords
b) Triggering a malicious action based on a specific event or time
c) Recording keystrokes
d) Displaying unwanted advertisements

Answer: b) Triggering a malicious action based on a specific event or time

8. A virus that is specifically designed to spread through email?
a) Worm
b) Macro virus
c) Email virus
d) Adware

Answer: c) Email virus

9. A virus famous for making multiple copies of itself, spreads, and infects other computers over a network is called _____.
a) Worm
b) Trojan horse
c) Macro virus
d) Adware

Answer: a) Worm

10. Which is NOT a common and enough method to protect against computer viruses?
a) Using updated antivirus software
b) Avoiding suspicious email attachments and links
c) Disabling the firewall
d) Both A and B

Answer: c) Disabling the firewall

11. A ransomware virus is developed for ___.
a) Stealing sensitive information
b) Slowing down computer performance
c) Encrypting files and demanding payment for decryption
d) Deleting system files

Answer: c) Encrypting files and demanding payment for decryption

12. Which type of virus is designed to replicate and spread without any user intervention?
a) Trojan horse
b) Worm
c) Spyware
d) Adware

Answer: b) Worm

13. What is a heuristic-based antivirus approach?
a) Using pre-defined virus signatures
b) Learning from previous virus patterns to detect new threats
c) Blocking all incoming emails
d) Only scanning executable files

Answer: b) Learning from previous virus patterns to detect new threats

14. Viruses enter the computer when the computer starts is ______________.
A) Salami shaving
B) Macro
C) File infector
D) Boot sector
E) All of these
F) None of these

Answer: D) Boot sector

Computer Science Repeated MCQs Book Download

Add a Comment