Multiple-Choice Questions (MCQs) on Computer Viruses

1. What is a computer virus?

A) A type of hardware malfunction
B) A malicious software program that replicates itself
C) A computer overheating issue
D) A type of firewall

Answer: B) A malicious software program that replicates itself


2. Which type of virus attaches itself to executable files?

A) Macro virus
B) File infector virus
C) Boot sector virus
D) Worm

Answer: B) File infector virus


3. What is the primary function of a computer virus?

A) To protect the system from malware
B) To infect files and spread to other systems
C) To enhance system performance
D) To delete all files permanently

Answer: B) To infect files and spread to other systems


4. How do boot sector viruses infect a system?

A) Through email attachments
B) By modifying the startup sector of a storage device
C) By downloading software updates
D) Through social media

Answer: B) By modifying the startup sector of a storage device


5. Which virus changes its code to avoid detection by antivirus programs?

A) Macro virus
B) Polymorphic virus
C) Worm
D) Adware

Answer: B) Polymorphic virus


6. What does a Trojan Horse virus do?

A) It self-replicates like a worm
B) It disguises itself as legitimate software
C) It destroys computer hardware
D) It speeds up the system

Answer: B) It disguises itself as legitimate software


7. Which virus affects Microsoft Office files like Word and Excel?

A) File infector virus
B) Boot sector virus
C) Macro virus
D) Resident virus

Answer: C) Macro virus


8. What is the main difference between a virus and a worm?

A) Viruses spread without user action, while worms require execution
B) Worms spread without user action, while viruses require execution
C) Viruses cannot be detected, but worms can
D) Worms only affect mobile devices

Answer: B) Worms spread without user action, while viruses require execution


9. Which virus type encrypts files and demands payment for decryption?

A) Spyware
B) Ransomware
C) Worm
D) Adware

Answer: B) Ransomware


10. What is the purpose of a stealth virus?

A) To speed up the system
B) To hide its presence from antivirus software
C) To delete all system files
D) To improve network performance

Answer: B) To hide its presence from antivirus software


11. Which of the following is an example of a worm?

A) ILOVEYOU
B) Mydoom
C) Melissa
D) Michelangelo

Answer: B) Mydoom


12. What is the best method to prevent virus infections?

A) Disabling the internet
B) Using strong passwords
C) Installing and updating antivirus software
D) Increasing RAM

Answer: C) Installing and updating antivirus software


13. What does adware do?

A) Encrypts files and demands a ransom
B) Displays unwanted advertisements
C) Deletes system files
D) Spreads through email attachments

Answer: B) Displays unwanted advertisements


14. What is the primary method of spreading macro viruses?

A) Infecting USB drives
B) Exploiting web browsers
C) Attaching to Microsoft Office documents
D) Using brute-force attacks

Answer: C) Attaching to Microsoft Office documents


15. Which virus rewrites its own code each time it spreads?

A) Stealth virus
B) Metamorphic virus
C) Boot sector virus
D) Ransomware

Answer: B) Metamorphic virus


16. What is the payload of a virus?

A) The mechanism used for virus removal
B) The harmless part of the virus
C) The part of the virus that performs malicious actions
D) The antivirus detection tool

Answer: C) The part of the virus that performs malicious actions


17. How does spyware typically harm a system?

A) Encrypting all files
B) Secretly collecting user information
C) Corrupting the operating system
D) Physically damaging hardware

Answer: B) Secretly collecting user information


18. What was the main mode of spread for the ILOVEYOU virus?

A) Infected USB drives
B) Malicious email attachments
C) Website advertisements
D) Social media links

Answer: B) Malicious email attachments


19. How does a direct action virus operate?

A) Stays in system memory permanently
B) Activates only when an infected file is executed
C) Encrypts data for ransom
D) Attacks only mobile devices

Answer: B) Activates only when an infected file is executed


20. What is the role of an antivirus program?

A) To delete all files
B) To create viruses for testing
C) To detect, remove, and prevent malware infections
D) To increase internet speed

Answer: C) To detect, remove, and prevent malware infections

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *