Computer Security and Viruses # MCQs Practice set

Q.1 Which of the following is an example of a computer virus?

Trojan Horse
Firewall
Antivirus
Router
Explanation - A Trojan Horse is a type of malicious software that disguises itself as legitimate software to harm a system.
Correct answer is: Trojan Horse

Q.2 What does the term 'phishing' refer to in computer security?

Attempting to steal sensitive information using fake websites or emails
Updating antivirus software
Installing firewall
Encrypting files
Explanation - Phishing is a method used by attackers to trick users into revealing sensitive information like passwords and credit card numbers through deceptive emails or websites.
Correct answer is: Attempting to steal sensitive information using fake websites or emails

Q.3 Which of the following software protects a computer from viruses?

Antivirus
Spreadsheet
Word Processor
Operating System
Explanation - Antivirus software is designed to detect, prevent, and remove malicious programs from computers.
Correct answer is: Antivirus

Q.4 A 'worm' differs from a virus in that it:

Can replicate itself without human intervention
Needs a host file to spread
Is a hardware component
Is always harmless
Explanation - Unlike viruses, worms can spread independently without attaching to host files.
Correct answer is: Can replicate itself without human intervention

Q.5 What is the main function of a firewall?

To block unauthorized access to a network
To speed up the computer
To backup data automatically
To detect hardware issues
Explanation - A firewall monitors incoming and outgoing network traffic and blocks unauthorized access.
Correct answer is: To block unauthorized access to a network

Q.6 Ransomware is a type of malware that:

Encrypts files and demands payment for decryption
Deletes only temporary files
Improves system performance
Acts as a firewall
Explanation - Ransomware restricts access to the victim's data and demands a ransom to restore access.
Correct answer is: Encrypts files and demands payment for decryption

Q.7 Which of the following is NOT a type of computer malware?

Virus
Worm
Firewall
Trojan Horse
Explanation - Firewall is a security measure, not a type of malware.
Correct answer is: Firewall

Q.8 Spyware is designed to:

Monitor user activity secretly
Speed up the internet connection
Install updates
Backup files
Explanation - Spyware collects information about users without their consent and sends it to a third party.
Correct answer is: Monitor user activity secretly

Q.9 What is a 'logic bomb'?

A malicious program that executes when specific conditions are met
A type of firewall
A backup utility
A virus scanner
Explanation - A logic bomb is designed to trigger harmful actions when certain conditions, like a date or event, occur.
Correct answer is: A malicious program that executes when specific conditions are met

Q.10 Which of the following is considered a strong password practice?

Using a combination of letters, numbers, and symbols
Using your birthdate
Using 'password123'
Using a single word dictionary entry
Explanation - Strong passwords include uppercase, lowercase, numbers, and symbols to prevent easy guessing or brute-force attacks.
Correct answer is: Using a combination of letters, numbers, and symbols

Q.11 What is a keylogger?

Software that records keystrokes to steal information
A tool to enhance typing speed
A keyboard hardware component
A type of firewall
Explanation - Keyloggers capture every keystroke to obtain passwords and sensitive data without the user's knowledge.
Correct answer is: Software that records keystrokes to steal information

Q.12 Rootkits are dangerous because they:

Hide malware from detection by antivirus programs
Clean viruses automatically
Act as firewalls
Speed up the computer
Explanation - Rootkits conceal malicious software to avoid detection and maintain unauthorized access to a system.
Correct answer is: Hide malware from detection by antivirus programs

Q.13 A 'DoS' attack is primarily aimed at:

Making a network or website unavailable
Installing antivirus software
Backing up data
Encrypting files for security
Explanation - Denial-of-Service (DoS) attacks overwhelm systems or networks to make them inaccessible to users.
Correct answer is: Making a network or website unavailable

Q.14 Which of the following is an example of social engineering?

Pretending to be someone else to obtain confidential info
Installing antivirus software
Encrypting files
Updating a firewall
Explanation - Social engineering exploits human psychology to trick people into revealing sensitive information.
Correct answer is: Pretending to be someone else to obtain confidential info

Q.15 Which of the following ports is commonly targeted by malware attacks?

Port 80
Port 443
Port 22
Port 25
Explanation - Port 25, used for SMTP email, is often targeted by malware to send spam emails.
Correct answer is: Port 25

Q.16 Which of the following statements about Trojan Horses is correct?

They appear to be legitimate programs but are malicious
They always self-replicate
They act as firewalls
They cannot harm a computer
Explanation - Trojan Horses trick users by appearing harmless while performing malicious actions in the background.
Correct answer is: They appear to be legitimate programs but are malicious

Q.17 Which type of malware is specifically designed to record video or audio from a device without permission?

Spyware
Virus
Worm
Adware
Explanation - Spyware can monitor user activity including capturing audio, video, or screenshots to steal information.
Correct answer is: Spyware

Q.18 Adware is primarily designed to:

Display unwanted advertisements
Delete system files
Encrypt user data
Spy on keystrokes
Explanation - Adware automatically delivers unwanted advertisements, often bundled with free software.
Correct answer is: Display unwanted advertisements

Q.19 Which of the following is a safe practice to avoid email viruses?

Not opening attachments from unknown sources
Opening all emails
Disabling antivirus
Sharing passwords via email
Explanation - Many viruses are spread via email attachments; avoiding unknown attachments reduces infection risk.
Correct answer is: Not opening attachments from unknown sources

Q.20 What does 'two-factor authentication (2FA)' provide?

An additional layer of security beyond password
Faster system performance
Automatic virus removal
Network backup
Explanation - 2FA requires two forms of identification, such as a password and a one-time code, for enhanced security.
Correct answer is: An additional layer of security beyond password

Q.21 Which of the following best describes ransomware behavior?

Locks files and demands money to unlock
Deletes temporary files
Monitors user activity
Blocks network traffic
Explanation - Ransomware encrypts files or locks systems, demanding a ransom for access restoration.
Correct answer is: Locks files and demands money to unlock

Q.22 What is the main purpose of antivirus software's 'real-time protection'?

To monitor and block threats as they occur
To update the operating system
To speed up internet
To compress files
Explanation - Real-time protection actively scans for malware and prevents infections immediately.
Correct answer is: To monitor and block threats as they occur

Q.23 Which of the following is an example of a network-based attack?

Denial of Service (DoS)
Keylogger installation
Trojan Horse download
Adware installation
Explanation - DoS attacks target network resources, overwhelming them to make services unavailable.
Correct answer is: Denial of Service (DoS)

Q.24 Backdoor malware allows:

Unauthorized access to a system without detection
System optimization
Firewall configuration
File compression
Explanation - Backdoor malware creates hidden access points for attackers to control a system remotely.
Correct answer is: Unauthorized access to a system without detection