INTERNET SECURITY AND VIRUS
Welcome to this Mcqs on Internet security and viruses! The Internet has become an integral part of our daily lives, and with its widespread use comes the need for proper security measures to protect ourselves and our information. In mcqs, we will cover various topics related to Internet security, including types of viruses, ways to protect against online threats, and methods for removing viruses from your computer.
Viruses are malicious software that can spread from one computer to another and cause harm to your system. There are many different types of viruses, including worms, Trojan horses, and ransomware, and they can be transmitted through email attachments, website downloads, and even instant messages.
To protect yourself and your computer from viruses, it is important to use antivirus software and to be cautious when downloading files or visiting websites. Keeping your operating system and software up to date can also help to prevent vulnerabilities that could be exploited by viruses.
If your computer does become infected with a virus, there are steps you can take to remove it and protect your system from future infections. These include running a full scan with antivirus software, using a virus removal tool, and restoring your system to a previous state.
We hope you enjoy this Mcqs on Internet security and viruses!
Mcqs on Internet Security and Virus
Q1. VIRUS stands for?
- A) Very important record user searched
- B) very important resource under search
- C) Vital information resource under siege
- D) Verify information resources until source
Q2. Which of the following is the type of software that has self replicated software that causes damage to the files and system?
- A) Viruses
- B) Trojan horse
- C) Bots
- D) Worm
Q3. _____ is a program that appears or pretend to be a genuine application but actually causes damage to the executable files on the computer
- A) Trojan horse
- B) Adware
- C) Spyware
- D) Worm
Q4. Which of the following software posts unwanted advertisement on clients computer
- A) Virus
- B) Malware
- C) Worm
- D) Adware
Q5. Which of the following is a threat payment system?
- A) Trojan horse
- B) Computer virus
- C) Computer worm
- D) All of the above
Q6. When a logic bomb is activated by a time- related event, it is known as a
- A) Time- related
- B) Virus
- C) Time bomb
- D) Trojan horse
Q7. An act of sending e- mails or creating web pages that are designed to collect an individual’s online bank, credit card or other login information
- A) Spam
- B) Phishing
- C) Hacking
- D) Malware
Q8. Which one of the following is a key function of a firewall?
(A) Monitoring
(B) Deleting
(C) Moving
(D) None of the above
Q9. A digital signature is ………………
- A) Signature
- B) Encrypting information
- C) Signature in Binary form
- D) None of the Above
Q10. All of the following are examples of real security and privacy risks EXCEPT:
- Hackers
- Spam
- Viruses
- Identity theft
Q11. ensure secure transfer of data over an unsecured network, such as the Internet.
(A) Antivirus
(B) Hacking
(C) Spoofing
(D) Cryptography
Q12. Viruses are often transmitted by a floppy disk in the floppy disk drive.
(A) Boot-sector
(B) Trojan horse
(C) Script
(D) Logic bomb
Q13. Collecting personal information and effectively posing as another individual is known as the crime of
(A) Smishing
(B) Phishing
(C) Hacking
(D) Identity theft
Q14. ______ a program which reproduces itself
(A) Virus
(B) Software
(C) Program
(D) Both t and 2
Q15. Malware is a ………..program.
(A) Software
(B) Application
(C) System
(D) Malicious
Q16. A program that performs a useful task while simulating allowing destructive acts is a
(A) Worm
(B) Trojan horse
(C) Virus
(D) Macro virus
Q17. The virus that spread in application software is called as
(A) Boot virus
(B) Macro virus
C) File virus
(D) Antivirus
Q18. What is the name of the first computer virus?
A)The famous
(B) Harlie
(C) Param
(D) Creeper
Q19. McAfee is an example Of ………..
(A) Virus
(B) Antivirus
(C) Word Processing
(D) Photo Editing Software Software
Q20. Who coined the term computer virus?
(A) McFce
(B) Smiths
(C) Frederick Cohen
(D) Norton
Q21. Pop-ups virus are a form Of …………on the World Wide Web?
(A). Online Advertising
(B). Search Engines
(C). Browsers
(D). Mark-up Languages
Q22. Software, such as virus, worms and Trojan horse that has a malicious intent, is known as
(A) Spyware
(B) Adware
(C) Malware
(D) Spam
Q23. What type of technology scrambles the contents of files sent via the Internet?
- A) Encryption
- B) Secured data interchange
- C) Cryptogram
- D) Regulated code