MCQs on Viruses and Computer Security 14 Score: 0 Attempted: 0/14 Subscribe 1. : Which antivirus is harmful to the computer? (A) Shareware (B) Anti virus (C) Virus (D) Freeware 2. : What is a computer virus? (A) A hardware component (B) A type of antivirus software (C) A malicious software that infects other files (D) A computer programming language 3. : A polymorphic virus can ______. (A) Spread through social media platforms (B) Change its appearance (C) Delete files randomly (D) Only infect specific file types 4. : How do viruses typically spread? (A) Through physical contact with infected computers (B) Via infected email attachments, websites, or removable media (C) Only through software downloads from official sources (D) By manipulating computer hardware 5. : Which type of virus hides within another legitimate program? (A) Worm (B) Trojan horse (C) Macro virus (D) Spyware 6. : What does a rootkit virus typically do? (A) Encrypts files and demands ransom (B) Monitors and hides its presence on a system (C) Spreads through infected email attachments (D) Disables the antivirus software 7. : What is the purpose of a logic bomb? (A) Stealing passwords (B) Triggering a malicious action based on a specific event or time (C) Recording keystrokes (D) Displaying unwanted advertisements 8. : A virus that is specifically designed to spread through email? (A) Worm (B) Macro virus (C) Email virus (D) Adware 9. : A virus famous for making multiple copies of itself, spreads, and infects other computers over a network is called _____. (A) Worm (B) Trojan horse (C) Macro virus (D) Adware 10. : Which is NOT a common and enough method to protect against computer viruses? (A) Using updated antivirus software (B) Avoiding suspicious email attachments and links (C) Disabling the firewall (D) Both A and B 11. : A ransomware virus is developed for ___. (A) Stealing sensitive information (B) Slowing down computer performance (C) Encrypting files and demanding payment for decryption (D) Deleting system files 12. : Which type of virus is designed to replicate and spread without any user intervention? (A) Trojan horse (B) Worm (C) Spyware (D) Adware 13. : What is a heuristic-based antivirus approach? (A) Using pre-defined virus signatures (B) Learning from previous virus patterns to detect new threats (C) Blocking all incoming emails (D) Only scanning executable files 14. : Viruses enter the computer when the computer starts is ______________. (A) Salami shaving (B) Macro (C) File infector (D) Boot sector Related Posts:Comparison of Viruses Malware, Worm and TrojanEconomic Importance of VirusesHow to maintain software security and application securityBasic Computer Security and Cyber Threats MCQsCharacteristics and Difference between Mainframe Computer and Super Computer Web Security and forensics MCQs