0% found this document useful (0 votes)
101 views

Computer Virus

The document discusses different types of computer viruses including boot sector viruses, macro viruses, and polymorphic viruses. It also covers topics like antivirus software, symptoms of viruses, and ways that viruses spread.

Uploaded by

Guddu Guddu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views

Computer Virus

The document discusses different types of computer viruses including boot sector viruses, macro viruses, and polymorphic viruses. It also covers topics like antivirus software, symptoms of viruses, and ways that viruses spread.

Uploaded by

Guddu Guddu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 48

There are _________ types of

1 4
computer virus.
Which of the following is not
2 Boot sector
a type of virus?
computer ________ is a
malicious code which self-
3 program
replicates by copying itself to
other programs

Which of them is not an ideal


4 Infected website
way of spreading the virus?

In which year Apple II virus


5 1979
came into existence?
In mid-1981, the 1st virus for
Apple computers with the
6 Apple I
name _________ came into
existence
The virus hides itself from
7 getting detected by ______ 2
different ways.
________ infects the master
boot record and it is Boot Sector
8
challenging and a complex Virus
task to remove this virus

____ gets installed & stays


hidden in your computer’s
Boot Sector
9 memory. It stays involved to
Virus
the specific types of files
which it infects
Direct Action Virus is also Non-resident
10
known as ____ virus
________ infects the
Non-resident
11 executables as well as the
virus
boot sectors.
______ are difficult to
identify as they keep on Non-resident
12
changing their type and virus
signature.
_____ deletes all the files that Non-resident
13
it infects. virus
_______ is also known as Non-resident
14
cavity virus virus

Which of the below-


mentioned reasons do not
15 Research purpose
satisfy the reason why people
create a computer virus?

____ is the part of malware


such as worms or viruses
16 which performs the malicious Denial of service
action; deleting data, sending
spam or encrypting data.

_ is the action of recording


the keys struck on a keyboard,
typically covertly, so that the
17 Keylogging
person using the keyboard is
unaware that their actions are
being monitored.
The attack that focuses on
capturing small packets from
the network transmitted by
18 other computers and reading Phishing
the data content in search of
any type of information is
____

___ are computer programs


that are designed by attackers
19 Backdoors
to gain root or administrative
access to your computer.

What is the software called


which when get downloaded
on computer scans your hard
20 Antiware
drive for personal information
and your internet browsing
habits?

What is the software called


that’s designed to exploit a
computer user and is a broad
21 Spyware
term covering computer
viruses, worms, Trojan,
adware, etc.?
Which of  the following is a
software that, once installed
on your computer, tracks your
internet browsing habits and
22 Adware
sends you popups containing
advertisements related to the
sites and topics you’ve
visited?

Which of the following is the


type of software that has self-
23 replicating software that Worms
causes damage to files and
system?

Which of the following is a


type of program that either
pretends to have, or is
24 described as having, a set of Trojans
useful or desirable features
but actually contains
damaging code.

purpose of creating computer To stop computer


25
virus is piracy
Sharing infected
How does a computer virus internal portable
26 spread from one computer to disk like floppy
another? disk, pen drive,
CDs, etc.

What are the symptoms of Program take


27
computer virus? long time to load.

A virus that infects the part of


28 the computer called a system MBR
sector.

Virus can change


effects of computer virus the contents of
29
is/are file, and codes of
program.

A virus infects or substitutes


its own code for either the Boot Sector
30
DOS boot sector or the master Virus
boot record (MBR)

A small program that runs


31 every time the computer starts  Adware
up
Don’t
some preventive ways to interchange the
32 protect computer system form internal disk
virus. among the
computers.

A type of virus that infects


executable files having
33 Program Virus
.exe, .com, .ovl, .drv, .sys,
or .dil.
A virus that affects
34 Worm
application programs.

A virus that corrupts system Boot Sector


35
files of operating system. Virus

A virus that shows different


36 Stealth virus
behavior in each infection.

37 the types of viruses are Boot sector virus

A complicated virus that


affects data types and
Polymorphic
38 functions. It is a self
Virus
encrypted virus designed to
avoid detection by a scanner.

A code that mutates while


39 keeping the original algorithm NOD32
intact.
A series of commands and
40 actions that help to automate micro virus
some task
Types of of antivirus software
41 Kaspersky 
is
A computer virus that
damages the documents
42 Macro Virus
created in MS-Word & MS-
Excel.
A virus that infects both boot
43 sector of a disk and program Stealth Virus
files.

A file virus, that uses special


44 technique to hide its presence Macro Virus
from users and virus scanners.

A class of program that


searches your hard drive and
45 MBR
floppy disks for any known or
potential viruses.
A program that can disinfect a Antivirus
46
file from virus. Software
Software that do not come
47 Pirated Software
from reliable sources.
 Computer virus
48 Malware
is___________software.
 Hide in a host
49 Computer virus can
file 

50 Which is not a virus? Worm   

Which one is not a type of Message


51
virus? Carrying virus

52 Computer virus can destroy Hardware


53 Virus is a Utility program

54 Route of virus transmission. Mouse

What is the route of virus


55 Monitor 
transmission?
Computer virus can spread
Infected portable
56 from one computer to another
disk  
through_
Which of the following is not
57 AVG 
anti-virus
An example of antivirus
58 NAV
software is
 Norton antivirus, when
loaded onto a computer
59 viruses
system , checks the following
areas for

A program or set of programs


designed to prevent, search
for, detect, and remove
60 software viruses, and other Shareware 
malicious software like
worms, Trojans, adware and
more.

Which of the following is an


61 NAV   
anti-virus program?

_____ Virus are often


62 transmitted by a floppy disk Boot-sector
left in the floppy disk drive.
63 Boot sector virus infects System files   

A type of virus that infects the


first sector, i.e. the boot
64 Boot sector virus 
sector, of a floppy disk or
hard drive.

65 Which is antivirus software? Scan 

Disk Killer, stoned and


66 Michelangelo are examples of Boot sector virus
________________
A virus that infects the part of
Boot sector
67 the computer called a system
virus      
sector.
____infects or substitutes its
own code for either the DOS Boot sector
68
boot sector or the master boot virus  
record.(MBR)
Which of the following virus
69 infects the various parts of boot sector
operating system?

_____ Virus can infect both


70 Stealth virus     
programs and boot sectors.

Viruses attach themselves to


71 documents such as Word and Macro virus   
Excel.
A type of virus that replaces a
macro , which is what enables
72 a program to work and Macro virus   
instigates a designated group
of actions and commands.

A type of virus that infects


executable files having
73 Boot sector virus
.exe, .com, .ovl, .drv, .sys,
or .dil.
 A virus that can change its
appearance with every
74 Boot virus 
infection is
called_____________

                 is a self-encrypted
Polymorphic
75 virus designed to avoid
virus 
detection by a scanner.

Multipartite viruses have Boot sector &


76
combination features of stealth virus 

The first person who


John Von
77 introduced the concept of
Neumann
replicating program was____.

A_____ virus is a type of


computer virus that infects the
78 micro virus
word processing or spread
sheet document or template.

____viruses are very difficult


79 to identify and detect by anti- Stelth
virus.
  A  ___ virus is a
complicated computer virus File infecting
80
that affects data types and virus 
functions.
A program that is not a virus
but behave like virus and can
81 worm
replicate is known as
__________.
A malicious program that
pretends to be something
82 Trojan horse
useful program is known as
_______
File infector virus affect
83 terminating
______ file.
We should ______Latest and
84 updated antivirus in our uninstall
computer.

 A ____ is an area of the


computer hard drive or a
85 DBR
floppy disk that is executed
when the computer is started.

A program designed to
86 protect software from viruses  Firewall
is called _________

_____ are software programs


or hardware devices designed File infecting
87
to keep computers safe from virus 
hackers.
_________ viruses usually do
not destruct the computer
88 files/programs but display Message carrying
interesting information to
entertain the users.

The attack that focuses on


capturing small packets from
the network transmitted by
89 other computers and reading Phishing
the data content in search of
any type of information is
____

A bigger and
90 What is an antivirus? more dangerous
virus
Spyware is a type
of malware
installed on
computers that
91 What is Spyware? collects
information
about users
without their
knowledge

Many early
infectious
programs,
What are the uses of including the first
92
Malware? Internet Worm,
were written as
experiments or
pranks

 Which of the following is the


Michelangelo
93 first PC virus detected on
virus
ARPANET in 1970s?
Virus in computers is related
94 dust particles
to ___.
If your file is infected by a
virus and you are sending that  It will be
95 infected file to your friend infected by the
through e-mail, what happens virus.
to your friend's computer?

Which of the following is not


96 Boot records
affected by a computer virus?

Booting a PC
How is a virus transmitted in
97 from an infected
a computer?
medium

 Which of the following


98 software?s is not infected by a MS-DOS
virus?
To which type of virus does
99 Macro virus
WM-concept. A belong?
Which type of virus infects
100 Program virus
.SCR, .SYS files?
The viruses that change their
101 appearance to avoid detection MBR viruses 
are called___.
 Acid rain, Trojan and
102 Amoeba. A are examples of program viruses
___.
Which of the following is an
103 Alien.298   
example of a boot virus?
In which of the following files
104 can viruses be sent as email  .exe, .corn 
attachments?
Which of the following
105 viruses will damage Boot virus 
documents?
Which of the following is
106 used to detect and remove Virus software
virus from a computer
 Which of the following
107 antivirus programs has high McAfee
detection rate?
Which is the product of
108 Norton anitvirus
Symantec corporation?
Which of the following areas
109 does an antivirus check for a Boot records
virus?

 The antivirus softwares that


are installed in RAM and
continue to operate in the heuristic
110
background while other detectors 
software applications are
running are ___.

Which of the following


actions is performed by an Repairs the
111
antivirus software on a virus infected file  
infected file?

What do you call files which


112 have unknown virus that is  Quarantine files 
not listed in its database?

Which type of virus usually


113 enters a computer through e- Macro virus 
mail?
Which kind of virus attaches
 Self modifying
114 itself to the antivirus
virus 
program?
Which software was
115 developed by Natalya Norton antivirus
Kasperskaya in 1997?

What is short for malicious


software (is software designed
to disrupt computer operation,
116 Malisoft
gather sensitive information,
or gain unauthorized access to
computer systems)?

The altering of data so that it


117 is not usable unless the biometrics
changes are undone is
When a logic bomb is
118 activated by a time related trojan horse
event, it is known as -------

A ------- is a computer
program that can invade
computer and perform a
119 variety of functions ranging Computer Virus
from annoying(e.g. popping
up messages as a joke) to
dangerous (e.g. deleting files)

120 MCAfee is an example of Virus


7 10 12 10

Polymorphic Multipartite Trojans Trojans

virus application worm virus

Official Official Antivirus


Emails USBs
Antivirus CDs CDs

1980 1981 1982 1981

Apple II Apple III apple virus Apple II

3 4 5 3

Polymorphic Multipartite Trojans Boot Sector Virus

Direct Action Polymorphic Direct Action


Multipartite Virus
Virus Virus Virus

Boot Sector Polymorphic Non-resident


Multipartite Virus
Virus Virus virus
Boot Sector Polymorphic
Multipartite Virus Multipartite Virus
Virus Virus

Boot Sector Polymorphic Polymorphic


Multipartite Virus
Virus Virus Virus

Polymorphic
Overwrite Virus Multipartite Virus Overwrite Virus
Virus
Polymorphic
Overwrite Virus Space-filler Viru Space-filler Viru
Virus

Pranks Identity theft Protection Protection

Payload Scams Spamming Payload

Denial of
Exploits Scams Keylogging
service
Eavesdropping Scams Denial of service Eavesdropping

Rootkits Malware Spyware Rootkits

Malware Key-logger Spyware Spyware

Malware Bots Backdoors Bots


Malware Backdoors Spyware Adware

Viruses Trojan horses Backdoors Worms

Viruses Worm  Adware Trojans

To entertain user To entertain user


by displaying by displaying
interesting interesting All of the above All of the above
message and message and
pictures pictures
Downloading
files and
Exchanging data
programs form
and information All of the above All of the above
the websites
over a network
which are not
secure

The floppy disk


Increased use of
or hard disk is
disk space and
suddenly All of the above All of the above
growth in file
accessed without
size.
a logical reason.

Antivirus Boot Sector


NOD32 Boot Sector Virus
Software Virus

Degrade the
Change in size
overall
of file by adding
performance of All of the above All of the above
or removing text
computer
accordingly.
system.

NOD32 Worm Trojans File Infector Virus

MBR NOD32 Trojans MBR


 Use a good
Don’t install antivirus
pirated software, program to scan
All of the above All of the above
especially floppy disk, CD,
computer games. etc. before
copying.

 Multipartite
Stealth virus Boot sector virus Program Virus
virus

Program Virus NOD32 Trojans Program Virus

Worm MBR File Infector Virus File Infector Virus

Polymorphic Boot sector Polymorphic


none
Virus virus Virus
 Multipartite
Stealth virus All of the above All of the above
virus

Polymorphic
Stealth virus MBR Boot sector virus
Virus

Polymorphic Boot Sector Polymorphic


Worm
Code Virus Code

mega virus mini virus Macro Virus Macro Virus


Norton antivirus NOD32 All of the above All of the above

mini virus micro virus worm Macro Virus

Multipartite
Program Virus MBR Multipartite Virus
Virus

Stealth Virus worm micro virus Stealth Virus

Polymorphic Antivirus Antivirus


Program Virus
Code Software Software

Polymorphic Antivirus
mini virus MBR
Code Software
unpirated
MBR Stealth Virus Pirated Software
Software

Utility   Application Operating System  Malware

Replicate    Spread  All of the above. All of the above

Trojan Horse iv.


Logic bomb    Win-zip  Win-zip
Win-zip
Special Purpose Special Purpose
 Boot sector
System virus Application Application
virus   
Infector Infector
Software       Data   All Data
Destructive System Destructive
None
program program      Program
 Microphone      
Print   Pen drive Pen Drive
   

 Flash drive  Mouse   Cable Flash Drive

Pirated
The Internet All All of the above
software   

NAV   Kaspersky    XAB XAB

McAfee  CPAV   All  All

 programs at the
boot record  time you use   both Both
them     

Freeware Antivirus none Antivirus

Windows  Photoshop  All of the above NAV

Trojan horse  Script   logic bomb Boot Sector


 Master boot Application Master Boot
Document file
record  software Record

File infecting Polymorphic


None of the above Boot Sector Virus
virus  virus

Defrag Kaspersky Power point Kaspersky

File infecting Polymorphic


All of the above Boot Sector Virus
virus   virus   

File infecting Polymorphic


None of the above Boot Sector Virus
Virus    virus 

file infecting polymorphic


All Boot Sector Virus
virus    virus

Worm    Macro     system infector System Infector

 Multipartite  Polymorphic
File infectors  Multipartite Virus
virus   virus

 File Polymorphic
Worm  Macro Virus
infectors       virus  
File infecting Polymorphic
micro virus Macro Virus
virus  virus

File infecting     Script virus  Macro virus File infecting

Micro virus  Script virus   None None

Polymorphic
Macro virus   Script virus  None of the above
Virus

Boot sector Boot sector & Boot Sector &


None
&macro  virus program virus   program virus

william John Von


van gogh paulo
shakespeare Neumann

Macro mini virus mega virus Macro

 Boot sector
 None Script virus  Stelth
virus
Macro virus    polymorphic Worm  polymorphic

mini virus Stelth Macro virus worm

Boot sector
mega virus Macro Trojan horse
virus

executable stopping starting executable

Delete  install remove  install

MBR PBR HBR MBR

Antivirus Antivirus
worm Macro virus 
Software Software

Stelth mini virus  Firewall  Firewall


message
message deleting none Message carrying
stopping

Eavesdropping Scams Exploits Eavesdropping

Computer Computer
A biological agent
software used to software used to
that reproduces
Software used to prevent, detect prevent, detect
itself inside the
duplicate viruses and remove and remove
cells of living
malicious malicious
things
software software
Spyware
programs lurk
on your
computer to
The presence of
steal important
spyware is
information, like
typically hidden
your passwords  All of the above  All of the above
from the user
and logins and
and can be
other personal
difficult to detect
identification
information and
then send it off
to someone else

Malware is
Today, malware sometimes used
is used primarily broadly against
to steal sensitive government or
personal, corporate
financial, or websites to All of these All of these
business gather guarded
information for information, or
the benefit of to disrupt their
others operation in
general

Brain Creeper Carzy. A Creeper

hardware program All of these Program


My friend
It will not get You cannot send
cannot receive It will be infected
affected by the this file through e-
the file through by the virus
virus. mail.
e-mail.

Files on CD- Files on CD-


Spreadsheets Files on hard disk
ROM ROM   

Executing an Opening an
All the above All the above
infected program infected file

 Windows MS-Office  Both (a) and (b) Both (a) and (b)

Boot virus file virus Program virus Macro virus

Boot virus creeper macro virus Program virus

 Polymorphic  Polymorphic
DBR viruses Parasitic viruses 
viruses viruses

  boot viruses all none program viruses

Umbrella.3173 Devil.941  XM. Yohimbe.A Devil.941 

 .pif, .scr .vbs, .bat  All of these   All of these  


Program virus File virus  Macro virus    Macro virus  

Antivirus  Application Antivirus


System software
software software software

Norton Kaspersky none Kaspersky

Kaspersky
 McAfee Avast antivirus   Norton anitvirus
antivirus  

 All local hard


Programs  All of these  All of these 
drives

memory
TSR's    checksum memory resident 
resident 

Deletes the Quarantines the


all all
infected file infected file

 Word processor
Downloaded file Program files  Quarantine files 
files

 Boot sector File inspector Self modifying


Macro virus 
virus virus virus
Boot sector
Stealth virus all Stealth virus
virus

McAfee Kaspersky Kaspersky


Avast antivirus
antivirus antivirus antivirus

Malairasoft Moleculewar Malware Malware

encryption ergonomics compression encryption

time related bomb


time bomb virus time bomb
sequence

Antivirus Ms Word Ms Access Computer Virus

Photo Editing
Quick Heal Antivirus Antivirus
Software
option3

option4

option2

option3

option3

option2

option2

option1

option2

option1
option4

option3

option2

option4

option4

option2

option1
option2

option2

option4

option3
option1

option1

option1

option4
option4

option4

option3

option4

option1

option2
option4

option1

option2

option4

option2

option4

option1

option2

option4
option4

option1

option2

option2

option4

option1

option1

option1

option4

option4

option4

option3
option2

option4

option2

option4

option4

option4

option4

option3

option1

option1
option2

option1

option3

option1

option1

option1

option4

option3

option1
option1

option2

option4

option1

option3

option1

option2

option1
option3

option1

option1

option2

option3

option2

option3

option4
option1

option2

option3
option4

option4

option3

option3
option1

option3

option4

option4

option1

option1

option4

option1

option3

option4
option4

option2

option3

option1

option4

option2

option4

option1

option1
option2

option4

option4

option2

option2

option1

option3

You might also like