Mcqs on Internet Security and Virus

5/5 - (5 votes)


Welcome to this Mcqs on Internet security and viruses! The Internet has become an integral part of our daily lives, and with its widespread use comes the need for proper security measures to protect ourselves and our information. In mcqs, we will cover various topics related to Internet security, including types of viruses, ways to protect against online threats, and methods for removing viruses from your computer.

Viruses are malicious software that can spread from one computer to another and cause harm to your system. There are many different types of viruses, including worms, Trojan horses, and ransomware, and they can be transmitted through email attachments, website downloads, and even instant messages.

To protect yourself and your computer from viruses, it is important to use antivirus software and to be cautious when downloading files or visiting websites. Keeping your operating system and software up to date can also help to prevent vulnerabilities that could be exploited by viruses.

If your computer does become infected with a virus, there are steps you can take to remove it and protect your system from future infections. These include running a full scan with antivirus software, using a virus removal tool, and restoring your system to a previous state.

We hope you enjoy this Mcqs on Internet security and viruses!

Mcqs on Internet Security and Virus


Q1. VIRUS stands for? 

  1. A) Very important record user searched
  2. B) very important  resource under search
  3. C) Vital information resource under siege
  4. D) Verify information resources until source

C) Vital information resource under siege


Q2. Which of the following is the type of software that has self replicated software that causes damage to the files and system? 

  1. A) Viruses
  2. B) Trojan horse
  3. C) Bots
  4. D) Worm

D) Worm


Q3. _____ is a program that appears or pretend to be a genuine application but actually causes damage to the executable files on the computer

  1. A) Trojan horse
  2. B) Adware
  3. C) Spyware
  4. D) Worm

A) Trojan horse


Q4. Which of the following software posts unwanted advertisement on clients computer

  1. A) Virus
  2. B) Malware
  3. C) Worm
  4. D) Adware

D) Adware

Q5. Which of the following is a threat  payment system? 

  1. A) Trojan horse
  2. B) Computer virus
  3. C) Computer worm
  4. D) All of the above

D) All of the above


Q6. When a logic bomb is activated by a time- related event, it is known as a

  1. A) Time- related
  2. B) Virus
  3. C) Time bomb
  4. D) Trojan horse

D) Trojan horse

Q7. An act of sending e- mails or creating web pages that are designed to collect an individual’s online bank, credit card or other login information

  1. A) Spam
  2. B) Phishing
  3. C) Hacking
  4. D) Malware

B) Phishing

Q8. Which one of the following is a key function of a firewall? 

 (A) Monitoring

 (B) Deleting

 (C) Moving 

 (D) None of the above

(A) Monitoring


Q9. A digital signature is ……………… 

  1. A) Signature 
  2. B) Encrypting information
  3. C) Signature in Binary form
  4. D) None of the Above

B) Encrypting information


Q10. All of the following are examples of real security and privacy risks EXCEPT: 

  1. Hackers 
  2. Spam
  3. Viruses
  4. Identity theft

B. Spam

Q11. ensure secure transfer of data over an unsecured network, such as the Internet. 

(A) Antivirus 

(B) Hacking 

(C) Spoofing

(D) Cryptography

(D) Cryptography


Q12. Viruses are often transmitted by a floppy disk in the floppy disk drive. 

(A) Boot-sector

(B) Trojan horse

(C) Script

(D) Logic bomb

(A) Boot-sector

Q13. Collecting personal information and effectively posing as another individual is known as the crime of 

(A) Smishing

(B) Phishing

(C) Hacking 

(D) Identity theft

(B) Phishing


Q14. ______ a program which reproduces itself 

(A) Virus

(B) Software 

(C) Program 

(D) Both t and 2

(A) Virus

Q15. Malware is a ………..program. 

(A) Software 

(B) Application 

(C) System 

(D) Malicious

(D) Malicious


Q16. A program that performs a useful task while simulating allowing destructive acts is a

(A) Worm

(B) Trojan horse

(C) Virus

(D) Macro virus

(B) Trojan horse

Q17. The virus that spread in application software is called as

(A) Boot virus

(B) Macro virus

C)  File virus

(D) Antivirus

(B) Macro virus


Q18. What is the name of the first computer virus? 

A)The famous

(B) Harlie

(C)  Param

(D) Creeper

(D) Creeper

Q19. McAfee is an example Of ………..

(A) Virus 

(B) Antivirus

(C) Word Processing 

(D) Photo Editing Software Software

(B) Antivirus


Q20. Who coined the term computer virus? 

(A) McFce 

(B) Smiths 

(C) Frederick Cohen

(D) Norton

(C) Frederick Cohen

Q21. Pop-ups virus are a form Of …………on the World Wide Web? 

(A). Online Advertising

(B). Search Engines 

(C). Browsers 

(D). Mark-up Languages

(A). Online Advertising


Q22. Software, such as virus, worms and Trojan horse that has a malicious intent, is known as 

(A) Spyware 

(B) Adware 

(C) Malware

(D) Spam 

(C) Malware

Q23. What type of technology scrambles the contents of files sent via the Internet? 

  1. A) Encryption
  2. B) Secured data interchange 
  3. C) Cryptogram 
  4. D) Regulated code

A) Encryption



Notify of
Inline Feedbacks
View all comments