INTERNET SECURITY AND VIRUS
Welcome to this Mcqs on Internet security and viruses! The Internet has become an integral part of our daily lives, and with its widespread use comes the need for proper security measures to protect ourselves and our information. In mcqs, we will cover various topics related to Internet security, including types of viruses, ways to protect against online threats, and methods for removing viruses from your computer.
Viruses are malicious software that can spread from one computer to another and cause harm to your system. There are many different types of viruses, including worms, Trojan horses, and ransomware, and they can be transmitted through email attachments, website downloads, and even instant messages.
To protect yourself and your computer from viruses, it is important to use antivirus software and to be cautious when downloading files or visiting websites. Keeping your operating system and software up to date can also help to prevent vulnerabilities that could be exploited by viruses.
If your computer does become infected with a virus, there are steps you can take to remove it and protect your system from future infections. These include running a full scan with antivirus software, using a virus removal tool, and restoring your system to a previous state.
We hope you enjoy this Mcqs on Internet security and viruses!
Mcqs on Internet Security and Virus
Q1. VIRUS stands for?
- A) Very important record user searched
- B) very important resource under search
- C) Vital information resource under siege
- D) Verify information resources until source
Q2. Which of the following is the type of software that has self replicated software that causes damage to the files and system?
- A) Viruses
- B) Trojan horse
- C) Bots
- D) Worm
Q3. _____ is a program that appears or pretend to be a genuine application but actually causes damage to the executable files on the computer
- A) Trojan horse
- B) Adware
- C) Spyware
- D) Worm
Q4. Which of the following software posts unwanted advertisement on clients computer
- A) Virus
- B) Malware
- C) Worm
- D) Adware
Q5. Which of the following is a threat payment system?
- A) Trojan horse
- B) Computer virus
- C) Computer worm
- D) All of the above
Q6. When a logic bomb is activated by a time- related event, it is known as a
- A) Time- related
- B) Virus
- C) Time bomb
- D) Trojan horse
Q7. An act of sending e- mails or creating web pages that are designed to collect an individual’s online bank, credit card or other login information
- A) Spam
- B) Phishing
- C) Hacking
- D) Malware
Q8. Which one of the following is a key function of a firewall?
(A) Monitoring
(B) Deleting
(C) Moving
(D) None of the above
Q9. A digital signature is ………………
- A) Signature
- B) Encrypting information
- C) Signature in Binary form
- D) None of the Above
Q10. All of the following are examples of real security and privacy risks EXCEPT:
- Hackers
- Spam
- Viruses
- Identity theft
Q11. ensure secure transfer of data over an unsecured network, such as the Internet.
(A) Antivirus
(B) Hacking
(C) Spoofing
(D) Cryptography
Q12. Viruses are often transmitted by a floppy disk in the floppy disk drive.
(A) Boot-sector
(B) Trojan horse
(C) Script
(D) Logic bomb
Q13. Collecting personal information and effectively posing as another individual is known as the crime of
(A) Smishing
(B) Phishing
(C) Hacking
(D) Identity theft
Q14. ______ a program which reproduces itself
(A) Virus
(B) Software
(C) Program
(D) Both t and 2
Q15. Malware is a ………..program.
(A) Software
(B) Application
(C) System
(D) Malicious
Q16. A program that performs a useful task while simulating allowing destructive acts is a
(A) Worm
(B) Trojan horse
(C) Virus
(D) Macro virus
Q17. The virus that spread in application software is called as
(A) Boot virus
(B) Macro virus
C) File virus
(D) Antivirus
Q18. What is the name of the first computer virus?
A)The famous
(B) Harlie
(C) Param
(D) Creeper
Q19. McAfee is an example Of ………..
(A) Virus
(B) Antivirus
(C) Word Processing
(D) Photo Editing Software Software
Q20. Who coined the term computer virus?
(A) McFce
(B) Smiths
(C) Frederick Cohen
(D) Norton
Q21. Pop-ups virus are a form Of …………on the World Wide Web?
(A). Online Advertising
(B). Search Engines
(C). Browsers
(D). Mark-up Languages
Q22. Software, such as virus, worms and Trojan horse that has a malicious intent, is known as
(A) Spyware
(B) Adware
(C) Malware
(D) Spam
Q23. What type of technology scrambles the contents of files sent via the Internet?
- A) Encryption
- B) Secured data interchange
- C) Cryptogram
- D) Regulated code
Cyber security mcq with answers pdf
1. Which of the following is an example of a computer virus?
a) Firewall
b) Router
c) Trojan horse
d) Browser
2. What is a keylogger?
a) A type of antivirus software
b) A hardware device used for authentication
c) A malicious program that records keystrokes
d) A secure encryption algorithm
3. What does SSL stand for in the context of Internet security?
a) Secure Socket Layer
b) Secure System Lock
c) Safe Surfing Link
d) Secure Software Load
4. Which of the following is a common method for protecting a Wi-Fi network?
a) Installing a firewall
b) Using strong encryption
c) Enabling MAC filtering
d) Disabling DHCP
5. What is phishing?
a) A type of malware
b) A social engineering attack
c) A method for encrypting data
d) A hardware firewall
6. Which of the following is NOT a good password practice?
a) Using a combination of letters, numbers, and symbols
b) Using the same password for multiple accounts
c) Changing passwords regularly
d) Avoiding common words or phrases
7. What is a firewall?
a) A type of virus
b) A hardware device that filters network traffic
c) A method for encrypting emails
d) A social engineering technique
8. What is the purpose of antivirus software?
a) To protect against computer viruses
b) To prevent unauthorized access to a network
c) To encrypt sensitive data
d) To block spam emails
9. What is a DoS attack?
a) Denial of Service attack
b) Distributed Operating System attack
c) Data Overload Security attack
d) Digital Operating Service attack
10. What is two-factor authentication?
a) A method of identifying viruses on a computer
b) The use of two different antivirus software programs
c) A security measure that requires two forms of verification
d) A technique for encrypting data using two algorithms
11. What is malware?
a) Malicious software
b) A hardware component of a computer
c) A type of encryption algorithm
d) A network protocol
12. What is a VPN?
a) Virtual Personal Network
b) Virus Prevention Network
c) Virtual Private Network
d) Vulnerability Protection Network
13. What is the purpose of a CAPTCHA?
a) To encrypt network traffic
b) To prevent brute-force attacks
c) To scan for malware on a computer
d) To monitor network activity
14. What is social engineering?
a) A method of encrypting data
b) A type of antivirus software
c) A technique used to manipulate people for malicious purposes
d) A hardware firewall
15. What is the purpose of a software patch?
a) To remove viruses from a computer
b) To fix bugs and vulnerabilities in software
c) To encrypt data on a hard drive
d) To monitor network traffic
16. What is a rootkit?
a) A type of computer virus
b) A hardware component of a computer
c) A method of encrypting files
d) A malicious program that provides unauthorized access to a system
17. What is a brute-force attack?
a) A type of encryption method
b) A method of bypassing a firewall
c) A technique used to crack passwords by trying all possible combinations
d) A form of phishing attack
18. What is a zero-day vulnerability?
a) A type of antivirus software
b) A software bug that has been present for zero days
c) A security flaw that is unknown to software developers
d) A type of firewall configuration
19. What is encryption?
a) The process of converting data into a secret code
b) A method of blocking network traffic
c) A type of antivirus software
d) The act of securing physical access to a computer
20. What is a data breach?
a) The loss or theft of sensitive information
b) The accidental deletion of files
c) The corruption of a hard drive
d) The failure of a network connection
What is cyber security mcqs?
Cyber security MCQs refer to multiple-choice questions that test knowledge and understanding of various aspects of cyber security. These questions cover topics such as network security, encryption, risk management, and incident response, among others.
Who is the father of cyber security Mcq?
The term “father of cyber security” is subjective and can vary depending on interpretation. However, if we consider pioneers in the field, Bruce Schneier is often regarded as one of the most influential figures in cyber security due to his extensive contributions to cryptography and his influential writings on security.
What is a computer virus in cyber security Mcq?
In the context of cyber security MCQs, a computer virus refers to a malicious software program designed to replicate itself and spread from one computer to another. It can cause damage to the infected system by corrupting or deleting files, disrupting system functionality, or stealing sensitive information.
What is malware Mcq?
Malware, in the context of cyber security MCQs, is a broad term that encompasses various types of malicious software. It includes computer viruses, worms, Trojan horses, ransomware, spyware, adware, and other harmful programs. Malware is designed to infiltrate systems without the user’s consent and can cause harm to data, devices, or networks.