Friday, June 23, 2017

MCQ - COMPUTER VIRUS - SEE 2074 [COMPUTER SCIENCE]



1.      Computer virus is a _____ software.
System program                        Application                        Destructive                  Utility
2.      Route of virus transmission.
Mouse                          Print                      Microphone                       Pen drive
3.      ________ Virus are often transmitted by a floppy disk left in the floppy disk drive.
Boot-sector                 Trojan horse                       Script                    logic bomb
4.      A virus that infects Master Boot Record of the computer system.
Macro virus                Multipartite virus                             Program infectors        Boot sector virus
5.      A virus that changes its appearance in every infection is called _______
Macro virus                System infectors                Polymorphic virus            Multipartite virus
6.      A virus that is designed to infect executable files is
File infectors              Macro virus                                       Polymorphic virus        Multipartite virus
7.      __________ Virus can infect both programs and boot sectors.
Stealth virus               File infectors                                     Multipartite virus        Polymorphic virus
8.      Viruses attach themselves to documents such as Word and Excel.
Macro virus                File infectors                                     Polymorphic virus        Multipartite virus
9.      A program that is designed to detect and delete virus.
Antivirus                     Malware                                             Freeware                      Shareware
10.   Computer virus is___________software.
i. Malware                   ii. Utility                             iii. Application   iv. Operating System
11.   Boot sector virus infects
i. System files                            ii. Master boot record        iii. Application software    iv. Document file
12.   Computer virus can spread from one computer to another through_
i. Infected portable disk           ii. The Internet                   iii. Pirated software           iv. All of the above.
13.   Computer virus can
i. Hide in a host file                  ii. Replicate                        iii. Spread                          iv. All of the above.
14.   Which is antivirus software?
i. Scan                          ii. Defrag              iii. Kaspersky                     iv. Power point
15.   A type of virus that infects the first sector, i.e. the boot sector, of a floppy disk or hard drive.
i) Boot sector virus            ii) File infecting virus             iii) Polymorphic virus                     iv) None of the above
16.   Disk Killer, stoned and Michelangelo are examples of ________________
i) Boot sector virus            ii) File infecting virus             iii) Polymorphic virus                     iv) All of the above
17.   A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus                     ii) File infecting                              iii) Script virus                                         iv) Macro virus
18.   A virus that can change its appearance with every infection is called_____________
i) Boot virus               ii) Micro virus                   iii) Script virus                                    iv) None of them
19.   A program designed to detect and remove virus from the computer system.
i) Shareware               ii) Freeware                       iii) Antivirus                                           iv) Malware
20.   The Melissa worm is released, targeting Microsoft Word and Outlook- based systems, and creating considerable network traffic.                                  
i) 1999                         ii) 2000                                             iii) 2006                                                   iv) 2010
21.   A computer program that can copy itself and infect a computer without the permission or knowledge of the user.
i. Computer worm       ii. Trojan Horse iii. Computer Virus           iv. None of the above
22.   A virus that infects the part of the computer called a system sector.
i. Boot sector virus              ii. File infecting Virus           iii. Polymorphic virus              iv. None of the above
23.   Disk Killer, Stoned and Michelangelo are the examples of                     
i. Boot sector virus      ii. File infecting Virus                   iii. Polymorphic virus         iv. Script virus
24.   The type of virus that is designed to infect executables files having extensions .exe, .com, or .dll.
i. Boot sector virus        ii. File Virus    iii. Script virus                 iv. Macro virus
25.                                 is a self-encrypted virus designed to avoid detection by a scanner.
i. Polymorphic virus                 ii. Macro virus    iii. Script virus    iv. None of the above
26.                                 is a class of program that searches your hard drive and floppy disks for  any known or potential viruses.
i. Shareware                        ii. Freeware iii. Antivirus                                 iv. Malware             
27.                                are programs that set up your modem connection to connect a 1-900 number.
i. Adware                     ii. Dialers                            iii. Hijackers       iv. Malware
28.   Virus are designed to infect the boot sector of the disk.
i. Boot sector virus                    ii. file infecting virus                            iii. Polymorphic virus
29.   The type of virus that is designed to infect executable program files having extension .exe, .com, or .dill.
 i. boot sector virus                       ii. file virus                    iii. script virus
30.   A type of virus that replaces a macro , which is what enables a program to work and instigates a designated group of actions and commands.
i)Macro virus                         ii)File infecting virus                       iii)Polymorphic virus
31.   A virus that changes its appearance in every infection is called
i)Polymorphic virus            ii)Macro virus                      iii)Script virus
32.   A program or set of programs designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware and more.
i)Shareware                     ii)Freeware                          ii)Antivirus
33.   Computer virus are known as
i. computer programs             ii. biological problems       iii. hardware components       iv. None of the above
34.   Which of the following is not anti-virus
i.AVG                                  ii.NAV                      iii, Kaspersky                      iv. I Love you
35.   Which of the following virus infects the various parts of operating system?
i. boot sector                        ii. Worm                    iii. Macro                             iv. system infector
36.   Which is the source for virus transfer?
i. Mouse                            ii. Pen drive                 iii. Printer                            iv. None of the above
37.   Which software protects from computer virus?
i. Antivirus software            ii. Word processing software              iii. Spreadsheet software     iv. Backup software
38.   Computer virus can destroy
i. Hardware                         ii. Software                  iii. Data                                iv. All
39.   Boot sector virus infects
i. System files                     ii. Master boot record              iii. Application software     iv. Document file
40.   Virus is a
i. Utility program   ii. Destructive program   iii. System program   iv. None
41.   Boot sector virus affects
i. System files   ii. Master Boot Record   iii. Application software   iv. None
42.   An example of antivirus software is
i. NAV   ii. McAfee   iii. CPAV              iv. All
43.   Multipartite viruses have combination features of
i. Boot sector & stealth virus           ii. Boot sector &macro  virus               iii. Boot sector & program virus      iv. None
44.   Boot sector virus infects or substitutes its own code for either the DOS boot sector or the master boot record.(MBR)
i. Boot sector virus                   ii. file infecting virus                       iii. polymorphic virus
45.   Disk killer, stoned, Michelangelo are the examples of ………..
i. Boot sector virus                   ii.File infecting virus                       iii. polymorphic virus
46.   The type of virus that is designed to infect executable program files having extensions .exe,.com,.dll
i. Boot sector virus                                  ii.File virus                                        iii.Script virus
47.   A virus that can change its appearance with every infection is called…..
 i. . polymorphic virus                             ii. Macro virus                   iii. Script virus
48.   A program designed to detect and remove virus from the computer system
i. shareware                ii.Freeware                         iii. Antivirus
49.   6. Norton antivirus, when loaded onto a computer system , checks the following areas for viruses         
boot record                 programs at the time you use them                                             both
50.   Which is not a virus?
i. Worm                       ii. Logic bomb                    iii. Trojan Horse iv. Win-zip
51.   Route of virus transmission:
i) Pen drive  ii) Microphone                  iii) Printer           
52.   Boot sector virus infects ……..
i) System file              ii) Master boot record      iii) Application software  iv) Document file
53.   Which computer virus damages the master boot record?
i) Macro virus            ii) File virus        iii) New folder virus         iv) Boot sector virus
54.   Which virus infects boot sector files?
i) Macro virus            ii) Multipartite virus         iii) Boot sector virus         iv) Program virus
55.   Which one is not a type of virus?
i) Message Carrying virus       ii) Boot sector virus          iii)System virus  iv)Special Purpose Application Infector
56.   Virus is a type of ___________.
i. System program      ii. Package program    iii. Destructive program   iv. Web program
57.   Which one is not a type of virus?
i) message carrying virus        ii) boot sector virus    iii) system infector   iv) special purpose application infector
58.   Which of the following is an anti-virus program?
        i) NAV                 ii) Windows        iii) Photoshop     iv) All of the above
59.   Computer virus is ……….
i) dust particle            ii) computer programs      iii) useful program            iv) none of the above
60.   What is the route of virus transmission?
i. Monitor     ii. Flash drive      iii. Mouse                           iv. Cable

MCQ - COMPUTER SECURITY - SEE 2074 [COMPUTER SCIENCE]



1.      The term computer security refers to:
Use of antivirus         Protection of software      Protection to a computer system   Use of firewall
2.      An important counter measure against data corruption or loss.
Password policy                        Defragmentation               Scan disk                     Backup system
3.      Which is not the power protection device?
UPS                                             Spike Guard                       Volt Guard                  Scan disk
4.      _______ protects the machine and peripheral devices from being damage.
Information security Hardware security             Software security              None of them
5.      To prevent the loss of data during power failures, we use:
Encryption program                 Surge protector                  Firewall                UPS
6.      _____ are used to avoid access for unauthorized users.
Logins                                         Passwords                           Encryption                  Lock and key
7.      Scan disk is used for
Removing virus                         Removing bad clusters                    Backup data        All of above
8.       _____________ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security         ii) Hardware security                          iii) Software security            iv) None of the above
9.      Some of the methods of hardware protection are:
i) Fire Alarms            ii) Security Lighting           iii)Closed-circuit cameras               iv)All of above
10.   c) The temperature in computer system should be maintained between ______to________
i)21`C to 24`C              ii) 20`C to 25`C                              iii) 23`C to 28`C                       iv) None of the above
11.    d) A device that protects your PC against power surges and spikes.
i) UPS              ii) Voltage Regulator                    iii) Surge suppressor                iv) All of the above
12.   e) The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security            ii) Hardware security                           iii) Software security                 iv) None of the above
13.                                protects the machine and peripheral hardware from theft electronic intrusion and damage.
i. Information security                      ii. Hardware security              iii. Software security                  iv. None of the above
14.   Some of the methods of hardware protection are:
i. Password security                  ii. Security lighting                          iii. Scandisk                  iv. All of the above
15.   The temperature in the computer system should be maintained between             and          .
i.68 to 72 degree Fahrenheit            ii.88 to 78 degree Fahrenheit               iii.68 to 27 degree Fahrenheit    iv. All
16.                               is a device that allows your computer to keep running for at least a short time when the primary power source is lost.
i.UPS           ii. Voltage regulator            iii. Surge processor             iv. All of the above
17.   An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS                ii. Voltage regulator       iii. Surge processor           iv. All of the above
18.                               refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation         ii. Defragmentation          iii. Scan disk       iv. All of the above
19.   An important countermeasure against data corruption or loss.
i.Password policy      ii. Defragmentation           iii. Scan disk       iv. Backup system
20.   Protects the machine and peripheral hardware from theft, electronic intrusion and damage.
i)Information security            ii)Hardware security                    iii)Software security
21.   The temperature in the computer system should be maintained between                   to           .
i)21oC and 24oC                  ii)22oC and 25oC             iii)23oC and 26oC
22.   A device that protects your PC against power surges and spikes.
i)UPS                   ii) Voltage regulator                       iii)Surge suppressor
23.   The type of security barriers and other cyber-tools that protect programs files, and the information  flow to and from a computer.
i)Computer security                  ii)Hardware security              iii)Software security
24.   The process of loading the noncontiguous fragments of data, rearranging   the fragments and restoring  them into fewer fragments or into the whole life.
i)Fragmentation              ii)Defragmentation              iii)Scan disk
25.   Which of the following is not hardware security method?
i. Insurance     ii. Maintenance       iii. Closed-circuit cameras        iv. Hard lock key
26.   Which of the following measure allows to protect compouters being opened from unauthorized user?
i .Antivirus program      ii. Password                 iii. Debug               iv. program
27.   The computer security is purely concerned with the following
i. Hardware security            ii. software security     iii. Hardware and software security              iv. Data security
28.   Which of the following is not power supply device?
i. Volt guard               ii.UPS            iii. Constant Voltage Transformer                    iv. Power Plug
29.   Which of the following is not software security measure?
i. Virus Scanning          ii. Scandisk                  iii. Password             iv. Security Guard
30.   Common computer security is
Hardware Security           Software security        Hardware & software security        None of them
31.   Hardware security includes
Regular maintenance               Use of power of regulator devices               Both                       None of them
32.   Data and software security includes
Protection from computer virus            Cover the computer property         Both          None of them
33.   UPS is a
Voltage filtration device         Voltage processing device                             Voltage regulator device           None
34.   Scan disk is performed by using
Application software               Operating system software                            Utility software      None
35.   Backup is way of
                                     i.          Securing data and information                                            Securing internal part of the computer
                                    ii.          Securing external parts of the computer                            None of them
36.   Defragmentation is a process of
Formatting the disk         Relocation of the disk                              Relocation of the files of the disk               None of them
37.   …….protects the machine and peripheral hardware from theft, electronic intrusion and damage.
i. information security                     ii. Hardware security                       iii. Software security
38.   The temperature in the computer system should be maintained between …. to ….
i.21 to 24                            ii.22 to 25                           ii.23 to 26          
39.   A device that protects your PC against power surges and spikes.
i. Uninterruptible Power Supply                         ii. Voltage regulator      iii. Surge suppressor
40.   The type of security that provides barriers and other cyber tools that protects program, files, and the information flow to and from a computer
i. computer security          ii. Hardware security                       iii. Software security
41.   The ………. Process optimize the read/write process by realigning the speed posiyion of related file clusters to speed up the overall operation of the drive
i. Fragmentation                        ii. Defragmentation                          iii. Scan disk
42.   Which device protects hardware?
i) UPS           ii) MODEM         iii) Gateway        iv) All of the above
43.   Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging           ii. Backup        iii. Defragmentation      iv. Scandisk
44.   Process of arranging the scattered parts of file into a contiguous manner.
        i) Backup            ii) Defragmentation          iii) Debugging     iv) All of the above