find latest, unique and most imp computer security aspects mcq for all competitive and entrance exams, cuet, CS, IP and IT students. it covers viruses, worms, trojan, antivirus, firewall and many more..
- Malware stands for
a. Malfunctioned Software
b. Malcontent Software
c. Malaysian Software
d. Malicious Software
Show Answer
d. Malicious Software
- Which of the following is not a malware?
a. Viruses
b. Worms
c. Trojan
d. Cookies
Show Answer
d. Cookies
- (i) virus is a piece of software code that is created to hamper system resources and activated as soon as infected file is opened by user
(ii) Virus behaves uniformly without caring of reason or motivation behind their creation
a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are true
d. Both are False
Show Answer
a. (i) True, (ii) False
- I
Am a malware
Am standalone program and capable of working on my own.
Nimda, Code Red are some of my examples
Who am I?
a. Firewall
b. Worms
c. Trojan
d. Spyware
Show Answer
b. Worms
- __________ looks like a legitimate software which once installed acts like a virus.
a. Worm
b. Trojan
c. Spyware
d. Cookies
Show Answer
b. Trojan
- Which of the following is usually annoying but harmless for system?
a. Spyware
b. Adware
c. Trojan
d. Worms
Show Answer
b. Adware
- The virtual keyboard of an operating system that uses a fixed QWERTY key layout is called
a. On-Screen Keyboard
b. Online Virtual Keyboard
c. Virtual Qwerty Keyboard
d. Virtual Keypad
Show Answer
a. On-Screen Keyboard
- The virtual keyboard that randomizes the key layout every time it is used
a. On-Screen Keyboard
b. Online Virtual Keyboard
c. Virtual Qwerty Keyboard
d. Virtual Keypad
Show Answer
b. Online Virtual Keyboard
- A malware once designed, can take many routes to reach your computer. Which of the followings you think is not correct channel of distribution of malware:
a. Downloaded from the Internet into hard drive of computer by user unintentionally
b. Removable storage media infected with malware get transferred to other systems that they are plugged into
c. Links or attached files with unsolicited email we receive can be malware
d. All are correct
Show Answer
d. All are correct
- Raju has been asked to identify common sign of some malware infection. Help him out to find so from given option:
a. Program opening and closing automatically.
b. Sudden lack of storage space, random sound starts to appear.
c. Computer get slow down with frequent crashes
d. All of the above
e. (b) and (c)
Show Answer
d. All of the above
- Act of repeatedly sending advertisement links and invitation emails to a large number of users is called:
a. Stacking
b. Hacking
c. Spamming
d. Denial of Service
Show Answer
c. Spamming
- HTTPS is
a. Hypertext transfer protocol safe
b. Hypertext transfer protocol secure
c. Hypertext transfer protocol sensitive
d. Hypertext transfer protocol shared
Show Answer
b. Hypertext transfer protocol secure
- To get HTTPS for your website you need to get
a. Purchase domain from Google only
b. Purchase domain with SSL
c. Purchase domain with Firewall
d. Purchase domain only
Show Answer
b. Purchase domain with SSL
- It acts as a network filter and continuously monitors and controls the incoming and outgoing traffic.
a. Antivirus
b. Firewall
c. SSL
d. Sandbox
Show Answer
b. Firewall
- Cookies that gets recreated after being deleted is known as
a. Super cookies
b. Worm cookies
c. Nimda cookies
d. Zombie cookies
Show Answer
d. Zombie cookies
- _______ is a malware that records the key pressed by user on the keyboard. Using which one can get very sensitive and personal information of user like password emails etc.
a. Spyware
b. Snooping
c. Key logger
d. Denial of Service
Show Answer
c. Key logger
- Find the invalid method used by Antivirus to detect malware
a. Sandbox detection
b. Data mining technique
c. Firewall
d. Heuristics
Show Answer
c. Firewall
- It’s a kind of system used by antivirus where a new application or file is executed in a virtual machine (environment) to detect any malicious activity by observing its behavior
a. Data mining
b. Sandbox
c. Heuristics
d. VDF (Virus Definition File)
Show Answer
b. Sandbox
- Consecutive sequence of bytes that is commonly found in a certain malware sample is referred as
a. Virus polymorphic
b. Sandbox
c. Virus Signature
d. None of these
Show Answer
c. Virus Signature
- Method of comparing source code of a suspected program with already known virus present in database of antivirus is known as
a. Sandbox detection
b. Real time protection
c. Heuristics
d. Firewall
Show Answer
c. Heuristics
Great work!!! It is going to help many 😉
Keep Learning..Best Wishes!!