MCQs on Viruses and Computer Security
1. Which antivirus is harmful to the computer?
A) Shareware
B) Anti virus
C) Virus
D) Freeware
E) All of these
F) None of these
Answer: C) Virus
2. What is a computer virus?
a) A hardware component
b) A type of antivirus software
c) A malicious software that infects other files
d) A computer programming language
Answer: c) A malicious software that infects other files
3. A polymorphic virus can ______.
a) Spread through social media platforms
b) Change its appearance
c) Delete files randomly
d) Only infect specific file types
Answer: b) Change its appearance
4. How do viruses typically spread?
a) Through physical contact with infected computers
b) Via infected email attachments, websites, or removable media
c) Only through software downloads from official sources
d) By manipulating computer hardware
Answer: b) Via infected email attachments, websites, or removable media
5. Which type of virus hides within another legitimate program?
a) Worm
b) Trojan horse
c) Macro virus
d) Spyware
Answer: b) Trojan horse
6. What does a rootkit virus typically do?
a) Encrypts files and demands ransom
b) Monitors and hides its presence on a system
c) Spreads through infected email attachments
d) Disables the antivirus software
Answer: b) Monitors and hides its presence on a system
7. What is the purpose of a logic bomb?
a) Stealing passwords
b) Triggering a malicious action based on a specific event or time
c) Recording keystrokes
d) Displaying unwanted advertisements
Answer: b) Triggering a malicious action based on a specific event or time
8. A virus that is specifically designed to spread through email?
a) Worm
b) Macro virus
c) Email virus
d) Adware
Answer: c) Email virus
9. A virus famous for making multiple copies of itself, spreads, and infects other computers over a network is called _____.
a) Worm
b) Trojan horse
c) Macro virus
d) Adware
Answer: a) Worm
10. Which is NOT a common and enough method to protect against computer viruses?
a) Using updated antivirus software
b) Avoiding suspicious email attachments and links
c) Disabling the firewall
d) Both A and B
Answer: c) Disabling the firewall
11. A ransomware virus is developed for ___.
a) Stealing sensitive information
b) Slowing down computer performance
c) Encrypting files and demanding payment for decryption
d) Deleting system files
Answer: c) Encrypting files and demanding payment for decryption
12. Which type of virus is designed to replicate and spread without any user intervention?
a) Trojan horse
b) Worm
c) Spyware
d) Adware
Answer: b) Worm
13. What is a heuristic-based antivirus approach?
a) Using pre-defined virus signatures
b) Learning from previous virus patterns to detect new threats
c) Blocking all incoming emails
d) Only scanning executable files
Answer: b) Learning from previous virus patterns to detect new threats
14. Viruses enter the computer when the computer starts is ______________.
A) Salami shaving
B) Macro
C) File infector
D) Boot sector
E) All of these
F) None of these
Answer: D) Boot sector