CS/IT MCQ Collections

MCQ on Computer Security with answer set – 2

Pinterest LinkedIn Tumblr
Here are the collections of MCQ on computer security along with their answers. It includes multiple-choice questions about different types of malicious programs or viruses on a computer system.

1. …………… are used in denial of service attacks, typically against targeted websites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse

2. Select the correct order for the different phases of virus execution.
i) Propagation phase
ii) Dormant phase
iii) Execution phase
iv) Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i

3. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

4. …………………….. is a form of virus explicitly designed to hide from detection by antivirus software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

5. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
A) Boot Sector Virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

6. A portion of the Polymorphic virus, generally called a ……………………, creates, a random encryption, key to encrypt the remainder of the
virus.
A) mutual engine
B) mutation engine
C) multiple engines
D) polymorphic engines

7. State whether the following statement is true.
i) A macro virus is platform independent.
ii) Macro viruses infect documents, not executable portions of code.
A) i-only
B) ii-only
C) Both i and ii
D) Non i and ii

8. The type(s) of auto-executing macros, in Microsoft word, is/are
A) Auto execute
B) Auto Macro
C) Command macro
D) All of the above

9. In ……………, the virus places an identical copy of itself into other programs or into certain system areas on the disk.
A) Dormant phase
B) Propagation phase
C) Triggering phase
D) Execution phase

10. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors

Answers:

1. B) Zombie
2. C) ii, i, iv an iii
3. C) Parasitic Virus
4. A) Stealth virus
5. B) Polymorphic Virus
6. B) mutation engine
7. C) Both i and ii
8. D) All of the above
9. B) Propagation phase
10. B) Zombie

Read Next: Solved MCQ of Internet Security set-1

Please follow and like us:
RSS
Follow by Email
X (Twitter)
Visit Us
Follow Me
YouTube
YouTube
LinkedIn
linkedIn | MCQ on Computer Security with answer set – 2
Share

Author

Shuseel Baral is a web programmer and the founder of InfoTechSite has over 8 years of experience in software development, internet, SEO, blogging and marketing digital products and services is passionate about exceeding your expectations.

Comments are closed.

RSS
Follow by Email
X (Twitter)
Visit Us
Follow Me
YouTube
YouTube
LinkedIn
Share