Sail E0 Webinar

Computer Aptitude

COMPUTER VIRUS MCQs

Total Questions : 13 | Page 1 of 2 pages
Question 1.

Computer virus is

  1.    a hardware
  2.    windows tool
  3.    a computer program  
  4.    a system software
  5.    None of these
 Discuss Question
Answer: Option E. -> None of these
Question 2.

The first computer virus is

  1.    Creeper
  2.    PARAM
  3.    The Famous
  4.    HARLIE
  5.    None of these
 Discuss Question
Answer: Option A. -> Creeper
Question 3.

A time bomb occurs during a particular

  1.    data or time
  2.    logic and data
  3.    only time  
  4.    All of these
  5.    None of these
 Discuss Question
Answer: Option A. -> data or time
A time bomb is a type of malicious code that is programmed to execute or trigger after a certain amount of time or a specific event. It is a type of logic bomb that relies on a specific date or time to activate.
A logic bomb is a type of malware that is triggered by a specific event or condition, such as a particular date or time, a specific action taken by the user, or the presence or absence of a particular file or program. When the conditions are met, the logic bomb activates and can perform a variety of malicious actions, such as deleting files, stealing data, or disrupting normal system functions.
Therefore, option A, data or time, is the correct answer.
Here are some relevant definitions and formulas related to this topic:
  • Time bomb: A type of logic bomb that relies on a specific date or time to activate.
  • Logic bomb: A type of malware that is triggered by a specific event or condition.
  • Malware: Any software designed to cause harm to a computer system, network, or device.
  • Trigger: The specific event or condition that activates the logic bomb.
  • Payload: The malicious actions performed by the logic bomb once it is triggered.
  • Detection and prevention: Various techniques and tools can be used to detect and prevent logic bombs and other types of malware, including antivirus software, intrusion detection systems, and network security protocols.
In conclusion, a time bomb occurs during a particular data or time and is a type of logic bomb that relies on a specific date or time to activate.
Question 4.

First boot sector virus is

  1.    computed
  2.    mind
  3.     brain
  4.    Elk cloner
  5.    None of these
 Discuss Question
Answer: Option C. ->  brain
Question 5.

Which virus spread in application software?

  1.    Virus
  2.    Boot virus
  3.    File virus 
  4.    Anti-virus
  5.    Macro virus
 Discuss Question
Answer: Option E. -> Macro virus
A macro virus is a type of computer virus that is written in the same language as the application software it has infected. Macro viruses are spread through documents, spreadsheets and other software programs, which contain macros, small programs that automate tasks. Macro viruses work by replicating themselves and attaching to application software, such as Microsoft Word or Excel.

Definition:
Macro virus: A macro virus is a type of computer virus that is written in the same language as the application software it has infected.

Key Points:
Macro viruses are spread through documents, spreadsheets and other software programs, which contain macros, small programs that automate tasks.
Macro viruses work by replicating themselves and attaching to application software, such as Microsoft Word or Excel.
Macro viruses are difficult to detect, as they are embedded within the application software.
Macro viruses can cause a variety of damage to computer systems, from deleting files to corrupting data.
The only way to prevent macro viruses is to keep the application software updated and install anti-virus software.
Question 6.

Some viruses have a delayed payload, which is sometimes called a

  1.    time
  2.    anti-virus
  3.    bomb 
  4.    All of these
  5.    virus
 Discuss Question
Answer: Option C. -> bomb 
Question 7.

An anti-virus is a

  1.    program code
  2.    computer
  3.    company name  
  4.    application
  5.    None of these
 Discuss Question
Answer: Option A. -> program code
Question 8.

Trend Micro’ is a

  1.    virus program
  2.    anti-virus software
  3.    just a program
  4.    All of these
  5.    None of these
 Discuss Question
Answer: Option B. -> anti-virus software
Question 9.

Le-Hard virus is effect of a

  1.    Command. com
  2.    FRIDAY 13
  3.    Hardware
  4.    Software 
  5.    None of these
 Discuss Question
Answer: Option A. -> Command. com
The Le-Hard virus is a computer virus that was first discovered in October 1997. It is also known as "Chaihai" or "CIH" virus. This virus targets the Windows 95/98 operating system and infects the master boot record (MBR) of the hard disk drive. It can overwrite critical system files and can cause severe damage to the system.
Now, let's take a closer look at the given options and determine the correct answer:
A. Command.com: Command.com is a command interpreter for DOS and Windows operating systems. It is responsible for executing many of the internal commands of the operating system. The Le-Hard virus is a file infecting virus that targets Command.com, and when executed, it infects other executable files on the system.
B. FRIDAY 13: FRIDAY 13 is a virus that triggers on Friday the 13th and is not related to the Le-Hard virus.
C. Hardware: The Le-Hard virus is a software virus that infects the software components of a computer system. It does not affect the hardware components of the system.
D. Software: The Le-Hard virus is a software virus that infects the software components of a computer system.
E. None of these: As explained above, the correct answer to the given question is option A, "Command.com".
In conclusion, the Le-Hard virus is a file infecting virus that targets the Command.com interpreter in the Windows 95/98 operating system. When executed, it infects other executable files on the system and can cause severe damage to the system. It is important to have updated antivirus software installed to protect against such viruses.
Question 10.

It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents

  1.    keylogger
  2.    worm
  3.    anti-virus
  4.    cracker
  5.    virus
 Discuss Question
Answer: Option E. -> virus

Latest Videos

Latest Test Papers