Sail E0 Webinar

MCQs

Total Questions : 10
Question 1. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
  1.    Trojan Horse
  2.    Worm
  3.    Virus
  4.    Bots
 Discuss Question
Answer: Option C. -> Virus




Question 2. What is Spyware?
  1.    Spyware is a type of malware installed on computers that collects information about users without their knowledge
  2.    The presence of spyware is typically hidden from the user and can be difficult to detect
  3.    Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else
  4.    All of the above
 Discuss Question
Answer: Option D. -> All of the above




Question 3. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
  1.    Phishing
  2.    Eavesdropping
  3.    Scams
  4.    Exploits
 Discuss Question
Answer: Option B. -> Eavesdropping




Question 4. What are the uses of Malware?
  1.    Many early infectious programs, including the first Internet Worm, were written as experiments or pranks
  2.    Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others
  3.    Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general
  4.    All of these
 Discuss Question
Answer: Option D. -> All of these




Question 5. What is an antivirus?
  1.    A bigger and more dangerous virus
  2.    Software used to duplicate viruses
  3.    Computer software used to prevent, detect and remove malicious software
  4.    A biological agent that reproduces itself inside the cells of living things
 Discuss Question
Answer: Option C. -> Computer software used to prevent, detect and remove malicious software




Question 6. What are the types of malware?
  1.    Caterpillars
  2.    Worms
  3.    Lions
  4.    Horses
 Discuss Question
Answer: Option B. -> Worms




Question 7. Which of the following is a program capable of continually replicating with little or no user intervention?
  1.    Virus
  2.    Trojan horses
  3.    Rootkit
  4.    Worms
 Discuss Question
Answer: Option A. -> Virus




Question 8. Which of the following is not a stand-alone program?
  1.    Trojan
  2.    Worm
  3.    Virus
  4.    Spyware
 Discuss Question
Answer: Option C. -> Virus




Question 9. What is Trojan Horse?
  1.    A Trojan Horse program has the appearance of having a useful and desired function
  2.    A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer
  3.    A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort
  4.    All of the above
 Discuss Question
Answer: Option D. -> All of the above




Question 10. What are the examples of Malware Spreads?
  1.    Social network
  2.    Pirated software
  3.    Removable media
  4.    All of the above
 Discuss Question
Answer: Option D. -> All of the above




Latest Videos

Latest Test Papers