Mcqs on Internet Security and Virus

Share
5/5 - (5 votes)

INTERNET SECURITY AND VIRUS

Welcome to this Mcqs on Internet security and viruses! The Internet has become an integral part of our daily lives, and with its widespread use comes the need for proper security measures to protect ourselves and our information. In mcqs, we will cover various topics related to Internet security, including types of viruses, ways to protect against online threats, and methods for removing viruses from your computer.

Viruses are malicious software that can spread from one computer to another and cause harm to your system. There are many different types of viruses, including worms, Trojan horses, and ransomware, and they can be transmitted through email attachments, website downloads, and even instant messages.

To protect yourself and your computer from viruses, it is important to use antivirus software and to be cautious when downloading files or visiting websites. Keeping your operating system and software up to date can also help to prevent vulnerabilities that could be exploited by viruses.

If your computer does become infected with a virus, there are steps you can take to remove it and protect your system from future infections. These include running a full scan with antivirus software, using a virus removal tool, and restoring your system to a previous state.

We hope you enjoy this Mcqs on Internet security and viruses!

Mcqs on Internet Security and Virus

 

Q1. VIRUS stands for? 

  1. A) Very important record user searched
  2. B) very important  resource under search
  3. C) Vital information resource under siege
  4. D) Verify information resources until source

C) Vital information resource under siege

 

Q2. Which of the following is the type of software that has self replicated software that causes damage to the files and system? 

  1. A) Viruses
  2. B) Trojan horse
  3. C) Bots
  4. D) Worm

D) Worm

 

Q3. _____ is a program that appears or pretend to be a genuine application but actually causes damage to the executable files on the computer

  1. A) Trojan horse
  2. B) Adware
  3. C) Spyware
  4. D) Worm

A) Trojan horse

 

Q4. Which of the following software posts unwanted advertisement on clients computer

  1. A) Virus
  2. B) Malware
  3. C) Worm
  4. D) Adware

D) Adware

Q5. Which of the following is a threat  payment system? 

  1. A) Trojan horse
  2. B) Computer virus
  3. C) Computer worm
  4. D) All of the above

D) All of the above

 

Q6. When a logic bomb is activated by a time- related event, it is known as a

  1. A) Time- related
  2. B) Virus
  3. C) Time bomb
  4. D) Trojan horse

D) Trojan horse

Q7. An act of sending e- mails or creating web pages that are designed to collect an individual’s online bank, credit card or other login information

  1. A) Spam
  2. B) Phishing
  3. C) Hacking
  4. D) Malware

B) Phishing

Q8. Which one of the following is a key function of a firewall? 

 (A) Monitoring

 (B) Deleting

 (C) Moving 

 (D) None of the above

(A) Monitoring

 

Q9. A digital signature is ……………… 

  1. A) Signature 
  2. B) Encrypting information
  3. C) Signature in Binary form
  4. D) None of the Above

B) Encrypting information

 

Q10. All of the following are examples of real security and privacy risks EXCEPT: 

  1. Hackers 
  2. Spam
  3. Viruses
  4. Identity theft

B. Spam

Q11. ensure secure transfer of data over an unsecured network, such as the Internet. 

(A) Antivirus 

(B) Hacking 

(C) Spoofing

(D) Cryptography

(D) Cryptography

 

Q12. Viruses are often transmitted by a floppy disk in the floppy disk drive. 

(A) Boot-sector

(B) Trojan horse

(C) Script

(D) Logic bomb

(A) Boot-sector

Q13. Collecting personal information and effectively posing as another individual is known as the crime of 

(A) Smishing

(B) Phishing

(C) Hacking 

(D) Identity theft

(B) Phishing

 

Q14. ______ a program which reproduces itself 

(A) Virus

(B) Software 

(C) Program 

(D) Both t and 2

(A) Virus

Q15. Malware is a ………..program. 

(A) Software 

(B) Application 

(C) System 

(D) Malicious

(D) Malicious

 

Q16. A program that performs a useful task while simulating allowing destructive acts is a

(A) Worm

(B) Trojan horse

(C) Virus

(D) Macro virus

(B) Trojan horse

Q17. The virus that spread in application software is called as

(A) Boot virus

(B) Macro virus

C)  File virus

(D) Antivirus

(B) Macro virus

 

Q18. What is the name of the first computer virus? 

A)The famous

(B) Harlie

(C)  Param

(D) Creeper

(D) Creeper

Q19. McAfee is an example Of ………..

(A) Virus 

(B) Antivirus

(C) Word Processing 

(D) Photo Editing Software Software

(B) Antivirus

 

Q20. Who coined the term computer virus? 

(A) McFce 

(B) Smiths 

(C) Frederick Cohen

(D) Norton

(C) Frederick Cohen

Q21. Pop-ups virus are a form Of …………on the World Wide Web? 

(A). Online Advertising

(B). Search Engines 

(C). Browsers 

(D). Mark-up Languages

(A). Online Advertising

 

Q22. Software, such as virus, worms and Trojan horse that has a malicious intent, is known as 

(A) Spyware 

(B) Adware 

(C) Malware

(D) Spam 

(C) Malware

Q23. What type of technology scrambles the contents of files sent via the Internet? 

  1. A) Encryption
  2. B) Secured data interchange 
  3. C) Cryptogram 
  4. D) Regulated code

A) Encryption

 

Cyber security mcq with answers pdf

1. Which of the following is an example of a computer virus? 

a) Firewall 

b) Router 

c) Trojan horse 

d) Browser

Answer: c) Trojan horse

2. What is a keylogger? 

a) A type of antivirus software 

b) A hardware device used for authentication 

c) A malicious program that records keystrokes 

d) A secure encryption algorithm

Answer: c) A malicious program that records keystrokes

3. What does SSL stand for in the context of Internet security? 

a) Secure Socket Layer 

b) Secure System Lock 

c) Safe Surfing Link 

d) Secure Software Load

Answer: a) Secure Socket Layer

4. Which of the following is a common method for protecting a Wi-Fi network? 

a) Installing a firewall 

b) Using strong encryption 

c) Enabling MAC filtering 

d) Disabling DHCP

Answer: b) Using strong encryption

5. What is phishing? 

a) A type of malware 

b) A social engineering attack 

c) A method for encrypting data 

d) A hardware firewall

Answer: b) A social engineering attack

6. Which of the following is NOT a good password practice? 

a) Using a combination of letters, numbers, and symbols 

b) Using the same password for multiple accounts 

c) Changing passwords regularly 

d) Avoiding common words or phrases

Answer: b) Using the same password for multiple accounts

7. What is a firewall? 

a) A type of virus 

b) A hardware device that filters network traffic 

c) A method for encrypting emails 

d) A social engineering technique

Answer: b) A hardware device that filters network traffic

8. What is the purpose of antivirus software? 

a) To protect against computer viruses 

b) To prevent unauthorized access to a network 

c) To encrypt sensitive data 

d) To block spam emails

Answer: a) To protect against computer viruses

9. What is a DoS attack? 

a) Denial of Service attack 

b) Distributed Operating System attack 

c) Data Overload Security attack 

d) Digital Operating Service attack

Answer: a) Denial of Service attack

10. What is two-factor authentication? 

a) A method of identifying viruses on a computer 

b) The use of two different antivirus software programs 

c) A security measure that requires two forms of verification 

d) A technique for encrypting data using two algorithms

Answer: c) A security measure that requires two forms of verification

11. What is malware? 

a) Malicious software 

b) A hardware component of a computer 

c) A type of encryption algorithm 

d) A network protocol

Answer: a) Malicious software

12. What is a VPN? 

a) Virtual Personal Network 

b) Virus Prevention Network 

c) Virtual Private Network 

d) Vulnerability Protection Network

Answer: c) Virtual Private Network

13. What is the purpose of a CAPTCHA? 

a) To encrypt network traffic 

b) To prevent brute-force attacks 

c) To scan for malware on a computer 

d) To monitor network activity

Answer: b) To prevent brute-force attacks

14. What is social engineering? 

a) A method of encrypting data 

b) A type of antivirus software 

c) A technique used to manipulate people for malicious purposes 

d) A hardware firewall

Answer: c) A technique used to manipulate people for malicious purposes

15. What is the purpose of a software patch? 

a) To remove viruses from a computer 

b) To fix bugs and vulnerabilities in software 

c) To encrypt data on a hard drive 

d) To monitor network traffic

Answer: b) To fix bugs and vulnerabilities in software

16. What is a rootkit? 

a) A type of computer virus 

b) A hardware component of a computer 

c) A method of encrypting files 

d) A malicious program that provides unauthorized access to a system

Answer: d) A malicious program that provides unauthorized access to a system

17. What is a brute-force attack? 

a) A type of encryption method 

b) A method of bypassing a firewall 

c) A technique used to crack passwords by trying all possible combinations 

d) A form of phishing attack

Answer: c) A technique used to crack passwords by trying all possible combinations

18. What is a zero-day vulnerability? 

a) A type of antivirus software 

b) A software bug that has been present for zero days 

c) A security flaw that is unknown to software developers 

d) A type of firewall configuration

Answer: c) A security flaw that is unknown to software developers

19. What is encryption? 

a) The process of converting data into a secret code 

b) A method of blocking network traffic 

c) A type of antivirus software 

d) The act of securing physical access to a computer

Answer: a) The process of converting data into a secret code

20. What is a data breach? 

a) The loss or theft of sensitive information 

b) The accidental deletion of files 

c) The corruption of a hard drive 

d) The failure of a network connection

Answer: a) The loss or theft of sensitive information

 

What is cyber security mcqs?

Cyber security MCQs refer to multiple-choice questions that test knowledge and understanding of various aspects of cyber security. These questions cover topics such as network security, encryption, risk management, and incident response, among others.

Who is the father of cyber security Mcq?

The term “father of cyber security” is subjective and can vary depending on interpretation. However, if we consider pioneers in the field, Bruce Schneier is often regarded as one of the most influential figures in cyber security due to his extensive contributions to cryptography and his influential writings on security.

What is a computer virus in cyber security Mcq?

In the context of cyber security MCQs, a computer virus refers to a malicious software program designed to replicate itself and spread from one computer to another. It can cause damage to the infected system by corrupting or deleting files, disrupting system functionality, or stealing sensitive information.

What is malware Mcq?

Malware, in the context of cyber security MCQs, is a broad term that encompasses various types of malicious software. It includes computer viruses, worms, Trojan horses, ransomware, spyware, adware, and other harmful programs. Malware is designed to infiltrate systems without the user’s consent and can cause harm to data, devices, or networks.

Leave a Comment