MCQ on Computer Viruses and Security – Computer GK

Useful and informative MCQ on Computer Viruses and Security – Computer GK that include topics like Threats to Computer Security – Computer Viruses, Worms, Trojan Horses, Spyware, Adware, Spamming, PC Intrusion, Eavesdropping, Phishing and Pharming, Solution to Computer Security Threats, etc.

These MCQ on Computer Viruses and Security – Computer GK are very helpful for competitive exams such as CPCT, GATE, IES/ESE, IBPS PO, IBPS Clerk, SBI PO, SBI Clerk, RBI, SEBI, LIC, NICL, BCA, B.Sc. IT, DCA, SSC, RRB, NIELIT CCC, CTET, UDC NET, CUET, MCA, PGDCA, MCS, TET, State Police, BPO, etc.

These MCQ on Computer Viruses and Security – Computer GK have correct answers and brief explanations of each question for better understanding.

MCQ on Computer Viruses and Security

Q1. Which of the following is not a type of computer virus?
a) Boot Sector Virus
b) Polymorphic Virus
c) Trojan Horse
d) Direct Action Virus

Show Answer

Correct Answer: c) Trojan Horse
Explanation: A Trojan Horse is not a type of computer virus. It is a type of malware that disguises itself as a legitimate software or file to gain access to a user’s system. Once inside, it can cause damage, steal sensitive information, or allow unauthorized access to the system. Computer viruses, on the other hand, are malicious programs that self-replicate and attach themselves to other files or programs, causing damage or disruption to the system.

Q2. What is the primary difference between a computer virus and a worm?
a) Viruses require user action to spread, while worms spread automatically.
b) Worms are more harmful than viruses.
c) Viruses can replicate, but worms cannot.
d) Worms are a type of virus.

Show Answer

Correct Answer: a) Viruses require user action to spread, while worms spread automatically.
Explanation: The primary difference between a computer virus and a worm is the way they spread. Viruses typically require some sort of user action, such as opening an email attachment or visiting a malicious website, to spread and infect other files or programs. Worms, on the other hand, can spread automatically without any user action, often exploiting vulnerabilities in networks and systems to propagate themselves.

Q3. Which of the following is a common method used by attackers to spread computer viruses?
a) Email attachments
b) Legitimate software updates
c) Authorized access to a system
d) Secure websites

Show Answer

Correct Answer: a) Email attachments
Explanation: Email attachments are a common method used by attackers to spread computer viruses. When a user opens an infected attachment, the virus can infect the user’s system and potentially spread to other files, programs, or even other computers. To avoid infection, users should be cautious when opening attachments, especially from unknown senders, and use antivirus software to scan attachments before opening them.

Q4. What is the primary purpose of antivirus software?
a) To remove existing viruses from a computer
b) To prevent unauthorized access to a computer
c) To detect and block viruses before they can infect a computer
d) To repair damaged files caused by viruses

Show Answer

Correct Answer: c) To detect and block viruses before they can infect a computer
Explanation: The primary purpose of antivirus software is to detect and block viruses before they can infect a computer. Antivirus software scans files, incoming emails, and other potential sources of infection to identify and block malicious code. By preventing viruses from entering the system, antivirus software helps protect the computer and its data from damage or theft.

Q5. Which of the following is a type of malware that disguises itself as a legitimate software or file to gain access to a user’s system?
a) Worm
b) Trojan Horse
c) Adware
d) Spyware

Show Answer

Correct Answer: b) Trojan Horse
Explanation: A Trojan Horse is a type of malware that disguises itself as a legitimate software or file to gain access to a user’s system. Once inside, it can cause damage, steal sensitive information, or allow unauthorized access to the system. Unlike computer viruses, which self-replicate and attach themselves to other files or programs, Trojan Horses rely on deception and social engineering to trick users into installing or executing them.

Q6. What is phishing?
a) A type of computer virus that spreads through email attachments
b) A technique used by attackers to trick users into revealing sensitive information
c) A type of malware that displays unwanted advertisements
d) A method used by hackers to gain unauthorized access to a computer

Show Answer

Correct Answer: b) A technique used by attackers to trick users into revealing sensitive information
Explanation: Phishing is a technique used by attackers to trick users into revealing sensitive information, such as usernames, passwords, or financial details. Phishing attacks often involve deceptive emails or websites that appear to be from legitimate sources, prompting users to enter their information. Users can protect themselves from phishing attacks by being cautious when clicking on links or entering personal information online, and by using security software that can detect and block phishing attempts.

Q7. Which of the following is a type of computer virus that infects macro-enabled documents, such as Microsoft Word or Excel files?
a) Boot Sector Virus
b) Polymorphic Virus
c) Macro Virus
d) Direct Action Virus

Show Answer

Correct Answer: c) Macro Virus
Explanation: A macro virus is a type of computer virus that infects macro-enabled documents, such as Microsoft Word or Excel files. Macro viruses take advantage of the macro programming capabilities in these applications to spread and cause damage. When a user opens an infected document, the macro virus can execute its malicious code, potentially infecting other documents or causing other harmful actions on the user’s system.

Q8. What is a firewall?
a) A type of antivirus software
b) A hardware device that protects a computer from viruses
c) A security measure that monitors and controls incoming and outgoing network traffic
d) A type of malware that blocks access to a computer until a ransom is paid

Show Answer

Correct Answer: c) A security measure that monitors and controls incoming and outgoing network traffic
Explanation: A firewall is a security measure that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can be implemented as software or hardware and help protect a computer or network from unauthorized access, viruses, and other threats. By filtering and controlling the flow of data between a computer or network and the internet, firewalls help maintain the security and integrity of the system.

Q9. What is adware?
a) A type of computer virus that displays unwanted advertisements
b) A type of malware that collects information about a user’s browsing habits
c) A type of software that provides additional functionality to a web browser
d) A type of firewall that blocks access to certain websites

Show Answer

Correct Answer: a) A type of computer virus that displays unwanted advertisements
Explanation: Adware is a type of computer virus that displays unwanted advertisements on a user’s computer, often in the form of pop-up windows or banners. Adware can be annoying and disruptive, but it is generally not as harmful as other types of malware, such as viruses or Trojan Horses. However, some adware may also include spyware components that can collect information about a user’s browsing habits or personal information.

Q10. What is the best way to protect a computer from viruses and other malware?
a) Regularly update software and operating systems
b) Use strong passwords and enable multi-factor authentication
c) Install and maintain antivirus software
d) All of the above

Show Answer

Correct Answer: d) All of the above
Explanation: The best way to protect a computer from viruses and other malware is to use a combination of security measures, including regularly updating software and operating systems, using strong passwords and enabling multi-factor authentication, and installing and maintaining antivirus software. These measures help to minimize the risk of infection and ensure that a computer remains secure and functional.

error: Content is protected !!
Scroll to Top