Computer Virus


Available Answers

  1. 1.

    Choose the Correct Option.

    1. A malware that shows advertisements is called A'
      1. Adware
      2. Spam
      3. Spyware
      4. Trojans
    2. A group of junk mails that fills up your mail box is called
      1. Spam
      2. Spyware
      3. Adware
      4. Hijack
    3. Which utility is used to detect and remove viruses?
      1. Spyware
      2. Spam
      3. Antivirus
      4. None of these
    4. Name the method that is used to disable a virus to stop perform its normal activity.
      1. Fix
      2. Quarantine
      3. Delete
      4. All of these
    5. A malware that does not require a host to spread itself is called
      1. Worms
      2. Adware
      3. Spyware
      4. Spam
  2. 2.

    State True (T) or False (F):

    1. Viruses are created automatically by the operating system.
    2. A computer gets infected only when it accesses information directly or indirectly from an infected computer.
    3. The amount of free space getting reduced in your hard disk is one way of detecting whether your computer is infected.
    4. The boot sector virus infects the first sector of a hard disk or a floppy disk.
    5. File viruses replicate by attaching themselves to program files and Dynamic Link Libraries (DLL).
  3. 3.

    Fill in the blanks with the correct word:

    Stealth, Trojans, Spyware, Polymorphic, Multipartite
    1. _________________ viruses infect both hard disk sectors along with the executable files.
    2. _________________ viruses have the capability of changing themselves after infecting a computer.
    3. It is impossible to detect a _________________ virus.
    4. Programs that contain hidden malicious functions which may look like something funny or useful such as a game or utility, but harm the system when executed are called _________________.
    5. _________________  programs secretly gather information from the computer they have infected and transmit the information to a different location.
  4. 4.
    What is a Virus? How is it different from a worm?
  5. 5.
    What is a Polymorphic virus?
  6. 6.
    How does a Stealth virus work?
7 more answer(s) available.

Please login to post your comments.