0% found this document useful (0 votes)
15 views5 pages

Viruses_and_Antivirus_Mock_Test

Computer

Uploaded by

hackm1038
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views5 pages

Viruses_and_Antivirus_Mock_Test

Computer

Uploaded by

hackm1038
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Mock Test: Viruses and Antivirus

1. What is a computer virus?

2. Who created the first computer virus?

3. What is the primary function of antivirus software?

4. Which of the following is a type of malware?

5. What does 'Trojan Horse' malware do?

6. What is the full form of 'Worm' in computing?

7. What is the main difference between a virus and a worm?

8. Which type of virus attacks the boot sector of a computer?

9. What is ransomware?

10. Which of the following is NOT a type of antivirus software?

11. What is phishing?

12. What does 'Spyware' do?

13. What is the purpose of a firewall?

14. Which of the following is an example of a computer worm?

15. How does a keylogger work?

16. What is the full form of 'AV'?

17. Which file type is most commonly targeted by viruses?

18. What is an 'exploit' in cybersecurity?

19. What is the role of a 'heuristic analysis' in antivirus software?

20. What is a zero-day attack?

21. What is the term for software designed to damage or disable computers?

22. What is the function of a rootkit?

23. Which of the following is an online antivirus tool?

24. What is a polymorphic virus?

25. What is a macro virus?


26. What is adware?

27. What is the main characteristic of a logic bomb?

28. What is the role of an IDS (Intrusion Detection System)?

29. What is a backdoor in cybersecurity?

30. Which of these is NOT a malware type?

31. What does 'signature-based detection' mean in antivirus software?

32. Which company developed the first antivirus software?

33. What is the most effective way to avoid malware infections?

34. What is the meaning of 'quarantine' in antivirus software?

35. What is a botnet?

36. What does 'social engineering' mean in cybersecurity?

37. What is the function of an endpoint protection platform?

38. What is the role of encryption in protecting against malware?

39. What is a browser hijacker?

40. What is the main purpose of a honeypot in cybersecurity?

41. What is the primary characteristic of spyware?

42. What is 'pharming'?

43. What is the difference between active and passive attacks?

44. What does 'malicious code' refer to?

45. What is the function of a packet sniffer?

46. What is a cross-site scripting (XSS) attack?

47. What is a denial-of-service (DoS) attack?

48. What is the main goal of an antivirus scan?

49. Which protocol is more secure: HTTP or HTTPS?

50. What is the importance of regular updates for antivirus software?


Detailed Explanations

1. A computer virus is a malicious program designed to spread and disrupt

normal computer operations.

2. The first computer virus, 'Creeper', was created by Bob Thomas in 1971.

3. Antivirus software is designed to detect, prevent, and remove malware from

computers.

4. Malware includes viruses, worms, trojans, ransomware, etc.

5. A Trojan Horse disguises itself as legitimate software to trick users.

6. 'Worm' stands for nothing specific but refers to self-replicating malware.

7. Worms spread independently, whereas viruses need a host file to spread.

8. Boot sector viruses infect the master boot record of a disk.

9. Ransomware encrypts files and demands payment to restore access.

10. Examples of antivirus software include Norton, McAfee, and Kaspersky.

11. Phishing is a fraudulent attempt to obtain sensitive information.

12. Spyware secretly collects information about a user's activities.

13. A firewall blocks unauthorized access to a network.

14. 'ILOVEYOU' is an example of a computer worm.

15. A keylogger records keystrokes to steal sensitive data.

16. 'AV' stands for antivirus.

17. Executable files (like .exe) are commonly targeted by viruses.

18. An exploit takes advantage of vulnerabilities in software.

19. Heuristic analysis helps detect unknown malware by analyzing behavior.

20. A zero-day attack exploits vulnerabilities unknown to developers.

21. Malware is designed to damage or disable computers.

22. Rootkits hide the presence of malicious software on a system.

23. Examples include VirusTotal and Kaspersky Online Scanner.


24. A polymorphic virus changes its code to evade detection.

25. Macro viruses target macros in applications like Microsoft Office.

26. Adware displays unwanted advertisements to users.

27. A logic bomb triggers malicious actions when specific conditions are met.

28. IDS monitors network traffic for suspicious activities.

29. A backdoor allows unauthorized access to a system.

30. Options may include spam, which isn't malware.

31. Signature-based detection matches known malware patterns.

32. G Data Software created the first antivirus in 1987.

33. Avoiding suspicious downloads and updating software are effective

practices.

34. Quarantine isolates infected files to prevent further spread.

35. A botnet is a network of compromised computers controlled by attackers.

36. Social engineering tricks people into revealing confidential information.

37. Endpoint protection protects devices connected to a network.

38. Encryption protects data from being read by unauthorized users.

39. A browser hijacker redirects users to unwanted websites.

40. A honeypot lures attackers to study their behavior.

41. Spyware collects data without the user's knowledge.

42. Pharming redirects users to fraudulent websites.

43. Active attacks alter data, while passive attacks involve eavesdropping.

44. Malicious code refers to scripts intended to harm or exploit systems.

45. Packet sniffers capture and analyze network traffic.

46. XSS attacks inject malicious scripts into web pages.

47. A DoS attack floods a system to disrupt services.

48. Antivirus scans detect and remove malware from systems.

49. HTTPS is more secure as it uses encryption.


50. Updates ensure protection against the latest threats.

You might also like