Unit of Competence: Module Title: TTLM Code: Name: - Date
Unit of Competence: Module Title: TTLM Code: Name: - Date
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to
ask your teacher.
___________________ 9. These viruses are written specifically to infect Microsoft Office documents
(Word, Excel PowerPoint, etc.)
___________________10. This virus is designed to infect both the boot sector and files on your
computer.
___________________11. It is design to attack boot sector, causing your PC to refuse to start at all.
III. MULTIPLE CHOICE: Encircle the letter of the correct answer among the choices provided.
1. All are viruses except one which encrypt parts of themselves or otherwise modify themselves
as a method of disguise.
a. Polymorphic c. Metamorphic
b. Multimorphic d. Oligomorphic
2. It is a type of malware that was designed to gain administrative-level control over a computer
system without being detected.
a. File Virus c. Rootkit virus
b. Trojan Virus d. Boot Sector Virus
3. Which is more destructive?
a. False Positive c. True Positive
b. False Negative d. True Negative
4. What is the drawback of antivirus software.
a. It can boost computer performance c. It can speedup computer performance
b. It can repair computer performance d. It can impair computer performance
5. To prevent a virus to enter to your computer what operating system do you need to install to your
computer?
6. What account you must have so you can add new user account to the computer?
a. Guest c. Administrator
b. Limited d. Both Limited and Administrator
7. Melissa Virus is an example of what virus?
a. Adware c. Email virus
b. Spyware d. File Virus
8. All are spams filtering tools except for one.
a. Firewalls c. Anti-malware
b. Spam filters d. Hardware
9. This type of spam Hides behind the names of respected retailers, financial institutions,
businesses, charities and government bodies.
a. Phishing c. Malware Delivery
b. Advertising d. Scam
10. All are types of IP media except for one.
a. IM c. Blogs
b. VoIP d. Flash drive
11. You cannot guest account or profile when you log on to this account.
a. Administrator c. Guest
b. Limited d. Both Administrator and Limited
12. This type of spam is used to promote an entire spectrum of products and services, from
software to real estate to questionable medical and nutritional offerins.
a. Phishing c. Malware Delivery
b. Advertising d. Scam
13. Spam now constitute an overwhelming majority of what?
a. Scam c. Email traffic
b. Malware d. Virus
14. This spam was called as “hit and run” spamming.
a. The theft of resources c. The “Oceans of Spam” problem
b. The free ride d. The garbage
15. It is an account created for regular users of the computers.
a. Guest Account c. Personal Account
b. Limited Account d. Administrator Account
IV. MATCHING TYPE: Match Column A with Column B. Write the letter of the correct
answer on the space provided before the number.
A B
______ 1. Boot sector virus A. nowadays the virus utilize to spread
______ 2. Polymorphic virus B. the spreading part of the virus
______ 3. Cloud Antivirus C. spam that poses tragically ill children and other stock types
______ 4. Brend Fix D. the receiver pays more than the sender
______ 5. Multipartite virus E. bootable disk
______ 6. AVG Rescue CD F. virus that infects both boot sector and files
______ 7. The free ride G. the one who conducted first removal of virus
______ 8. Scam H. uses lightweight agent software
______ 9. Infection Phase I. virus that alters its code when they infect another computer
______ 10. Autorun J. virus that attacks boot sector