Computer Awareness for Upcoming Exams Set 86 (Malicious Programs)

Multiple Choice Questions on Computer Viruses for  IBPS PO, NICL AO, Dena Bank PO PGDBF, NIACL Assistant/AO, BoB PO, IBPS Clerk, BOI, and other competitive exams.

  1. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
    A) Trojans
    B) Viruses
    C) Worm
    D) Adware
    E) Bots
    View Answer
     Option A
    Explanation:
    Generally, you receive Trojan horses though emails, infected webpages, instant message, or downloading services like games, movies, and apps. True Trojan horses are not technically viruses, since they do not replicate; however, many viruses and worms use Trojan horse tactics to initially infiltrate a system.
    The best way to stay away from Trojans is by making sure you install software from trusted sources.
  2. Which of the following is the type of software that has self-replicating software that causes damage to files and system?
    A) Viruses
    B) Trojan horses
    C) Bots
    D) Worms
    E) Backdoors
    View Answer
     Option D
    Explanation:
    A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.
  3. Which of the following is a program capable of continually replicating with little or no user intervention?
    A) Virus
    B) Trojan horses
    C) Rootkit
    D) Worms
    E) Bots
    View Answer
     Option A
    Explanation:
    Typically, a piece of code causes damage to your computer either by deleting or corrupting files. A virus can also interfere with computer operations by multiplying itself to fill up disk space or randomly access memory space, secretly infecting your computer. They caneven your master boot records thereby making your computer start slow or not boot at all.
    Often viruses are disguised as games, images, email attachments, website URLs, shared files or links or files in instant messages.
  4. Which of  the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?
    A) Backdoors
    B) Adware
    C) Malware
    D) Bots
    E) Spyware
    View Answer
     Option B             Explanation :
    Some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
  5. What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?
    A) Backdoors
    B) Key-logger
    C) Malware
    D) Bots
    E) Spyware
    View Answer
     Option C
    Explanation:
    Malware is short for malicious software. Malware is a broad term that encompasses computer viruses, worms, Trojan horses, spyware, adware, and others. Malware is designed to interfere with normal computer operation, usually giving hackers a chance to gain access to your computer and collect sensitive personal information.
  6. What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
    A) Backdoors
    B) Key-logger
    C) Malware
    D) Antiware
    E) Spyware
    View Answer
     Option E
    Explanation:

    Spyware is malicious computer program that does exactly what its name implies-i.e., spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits. Some spyware programs contain keyloggers that will record personal data you enter in to websites, such as your login usernames and passwords, email addresses, browsing history, online buying habits, etc.
  7. _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.
    A) Backdoors
    B) Rootkits
    C) Malware
    D) Antiware
    E) Spyware
    View Answer
     Option B
    Explanation:
    Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system.
    Unlike most viruses, it is not directly destructive and unlike worms, its objective is not to spread infection as wide as possible.  
  8. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
    A) Phishing
    B) Eavesdropping
    C) Scams
    D) Exploits
    E) Denial of service
    View Answer
     Option B
    Explanation:
    Network eavesdropping is a network layer attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information.
    This type of network attack is generally one of the most effective as a lack of encryption services are used. It is also linked to the collection of metadata.
  9. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
    A) Denial of service
    B) Exploits
    C) Scams
    D) Keylogging
    E) Spamming
    View Answer
     Option D
    Explanation:
    Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
  10. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
    A) Denial of service
    B) Exploits
    C) Scams
    D) Payload
    E) Spamming
    View Answer
     Option D
    Explanation:
    In computer security, the payload is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data. In addition to the payload, such malware also typically has overhead code aimed at simply spreading itself, or avoiding detection.

Click here for More Computer Awareness Questions

 

 

 

Related posts