MCQ on Computer Viruses and Security – Computer GK
Useful and informative MCQ on Computer Viruses and Security – Computer GK that include topics like Threats to Computer Security – Computer Viruses, Worms, Trojan Horses, Spyware, Adware, Spamming, PC Intrusion, Eavesdropping, Phishing and Pharming, Solution to Computer Security Threats, etc.
These MCQ on Computer Viruses and Security – Computer GK are very helpful for competitive exams such as CPCT, GATE, IES/ESE, IBPS PO, IBPS Clerk, SBI PO, SBI Clerk, RBI, SEBI, LIC, NICL, BCA, B.Sc. IT, DCA, SSC, RRB, NIELIT CCC, CTET, UDC NET, CUET, MCA, PGDCA, MCS, TET, State Police, BPO, etc.
These MCQ on Computer Viruses and Security – Computer GK have correct answers and brief explanations of each question for better understanding.
Q1. Which of the following is not a type of computer virus?
a) Boot Sector Virus
b) Polymorphic Virus
c) Trojan Horse
d) Direct Action Virus
Show Answer
Correct Answer: c) Trojan Horse
Explanation: A Trojan Horse is not a type of computer virus. It is a type of malware that disguises itself as a legitimate software or file to gain access to a user’s system. Once inside, it can cause damage, steal sensitive information, or allow unauthorized access to the system. Computer viruses, on the other hand, are malicious programs that self-replicate and attach themselves to other files or programs, causing damage or disruption to the system.
Q2. What is the primary difference between a computer virus and a worm?
a) Viruses require user action to spread, while worms spread automatically.
b) Worms are more harmful than viruses.
c) Viruses can replicate, but worms cannot.
d) Worms are a type of virus.
Show Answer
Correct Answer: a) Viruses require user action to spread, while worms spread automatically.
Explanation: The primary difference between a computer virus and a worm is the way they spread. Viruses typically require some sort of user action, such as opening an email attachment or visiting a malicious website, to spread and infect other files or programs. Worms, on the other hand, can spread automatically without any user action, often exploiting vulnerabilities in networks and systems to propagate themselves.
Q3. Which of the following is a common method used by attackers to spread computer viruses?
a) Email attachments
b) Legitimate software updates
c) Authorized access to a system
d) Secure websites
Show Answer
Correct Answer: a) Email attachments
Explanation: Email attachments are a common method used by attackers to spread computer viruses. When a user opens an infected attachment, the virus can infect the user’s system and potentially spread to other files, programs, or even other computers. To avoid infection, users should be cautious when opening attachments, especially from unknown senders, and use antivirus software to scan attachments before opening them.
Q4. What is the primary purpose of antivirus software?
a) To remove existing viruses from a computer
b) To prevent unauthorized access to a computer
c) To detect and block viruses before they can infect a computer
d) To repair damaged files caused by viruses
Show Answer
Correct Answer: c) To detect and block viruses before they can infect a computer
Explanation: The primary purpose of antivirus software is to detect and block viruses before they can infect a computer. Antivirus software scans files, incoming emails, and other potential sources of infection to identify and block malicious code. By preventing viruses from entering the system, antivirus software helps protect the computer and its data from damage or theft.
Q5. Which of the following is a type of malware that disguises itself as a legitimate software or file to gain access to a user’s system?
a) Worm
b) Trojan Horse
c) Adware
d) Spyware
Show Answer
Correct Answer: b) Trojan Horse
Explanation: A Trojan Horse is a type of malware that disguises itself as a legitimate software or file to gain access to a user’s system. Once inside, it can cause damage, steal sensitive information, or allow unauthorized access to the system. Unlike computer viruses, which self-replicate and attach themselves to other files or programs, Trojan Horses rely on deception and social engineering to trick users into installing or executing them.
Q6. What is phishing?
a) A type of computer virus that spreads through email attachments
b) A technique used by attackers to trick users into revealing sensitive information
c) A type of malware that displays unwanted advertisements
d) A method used by hackers to gain unauthorized access to a computer
Show Answer
Correct Answer: b) A technique used by attackers to trick users into revealing sensitive information
Explanation: Phishing is a technique used by attackers to trick users into revealing sensitive information, such as usernames, passwords, or financial details. Phishing attacks often involve deceptive emails or websites that appear to be from legitimate sources, prompting users to enter their information. Users can protect themselves from phishing attacks by being cautious when clicking on links or entering personal information online, and by using security software that can detect and block phishing attempts.
Q7. Which of the following is a type of computer virus that infects macro-enabled documents, such as Microsoft Word or Excel files?
a) Boot Sector Virus
b) Polymorphic Virus
c) Macro Virus
d) Direct Action Virus
Show Answer
Correct Answer: c) Macro Virus
Explanation: A macro virus is a type of computer virus that infects macro-enabled documents, such as Microsoft Word or Excel files. Macro viruses take advantage of the macro programming capabilities in these applications to spread and cause damage. When a user opens an infected document, the macro virus can execute its malicious code, potentially infecting other documents or causing other harmful actions on the user’s system.
Q8. What is a firewall?
a) A type of antivirus software
b) A hardware device that protects a computer from viruses
c) A security measure that monitors and controls incoming and outgoing network traffic
d) A type of malware that blocks access to a computer until a ransom is paid
Show Answer
Correct Answer: c) A security measure that monitors and controls incoming and outgoing network traffic
Explanation: A firewall is a security measure that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can be implemented as software or hardware and help protect a computer or network from unauthorized access, viruses, and other threats. By filtering and controlling the flow of data between a computer or network and the internet, firewalls help maintain the security and integrity of the system.
Q9. What is adware?
a) A type of computer virus that displays unwanted advertisements
b) A type of malware that collects information about a user’s browsing habits
c) A type of software that provides additional functionality to a web browser
d) A type of firewall that blocks access to certain websites
Show Answer
Correct Answer: a) A type of computer virus that displays unwanted advertisements
Explanation: Adware is a type of computer virus that displays unwanted advertisements on a user’s computer, often in the form of pop-up windows or banners. Adware can be annoying and disruptive, but it is generally not as harmful as other types of malware, such as viruses or Trojan Horses. However, some adware may also include spyware components that can collect information about a user’s browsing habits or personal information.
Q10. What is the best way to protect a computer from viruses and other malware?
a) Regularly update software and operating systems
b) Use strong passwords and enable multi-factor authentication
c) Install and maintain antivirus software
d) All of the above
Show Answer
Correct Answer: d) All of the above
Explanation: The best way to protect a computer from viruses and other malware is to use a combination of security measures, including regularly updating software and operating systems, using strong passwords and enabling multi-factor authentication, and installing and maintaining antivirus software. These measures help to minimize the risk of infection and ensure that a computer remains secure and functional.
More MCQ on Computer GK for Competitive Exams
- Introduction to Computer
- Basic Computer Organization
- Number Systems
- Computer Codes
- Processor and Memory
- Secondary Storage Devices
- Input and Output Devices
- Computer Software
- Flowchart and Computer Languages
- System Implementation
- Operating Systems
- Application Software Packages
- Business Data Processing
- Communications and Networks
- Internet Concepts and IoT
- Multimedia and File Extensions
- Classification of Computers
- Cyber Safety and Cyber Crime
- Computer Viruses and Security
- Basic Computer Shortcut Keys
- Shortcut Keys for Windows
- Shortcut Keys for MS Excel
- Shortcut Keys for MS Word
- Computer Abbreviations Set 1
- Computer Abbreviations Set 2
- Computer Abbreviations Set 3
Get free Text Content Tools, Website Management Tools, Development Tools, Binary Converter Tools, Unit Converter Tools and SEO Tools on EuWebTools.