Computer-Viruses and Antiviruses (NCO- Cyber Olympiad (SOF) Class 11): Questions 1 - 5 of 20
Access detailed explanations (illustrated with images and videos) to 599 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.
Rs. 350.00 or
How to register?
Question number: 1
» Computer » Viruses and Antiviruses
Appeared in Year: 2014
Question
Which type of viruses spread in computer?
Choices
Choice (4) | Response | |
---|---|---|
a. | It is hardware |
|
b. | It is computer program |
|
c. | It is a window tool |
|
d. | It is system software |
|
Question number: 2
» Computer » Viruses and Antiviruses
Appeared in Year: 2014
Question
Identify the following.
-
It is a computer worm that affects Microsoft Windows.
-
It becomes fastest spreading e-mail worm.
-
It is also known as Novarg and Shimgapi and it was first found on January 26,2004.
Choices
Choice (4) | Response | |
---|---|---|
a. | Code Red |
|
b. | Mydoom |
|
c. | Melissa |
|
d. | Cabir |
|
Question number: 3
» Computer » Viruses and Antiviruses
Question
What is the name of the first ‘computer virus’? (Model test paper 2)
Choices
Choice (4) | Response | |
---|---|---|
a. | Melissa |
|
b. | Creeper |
|
c. | Blaster Worm |
|
d. | Trojan horse |
|
Question number: 4
» Computer » Viruses and Antiviruses
Appeared in Year: 2014
Question
Which of the following virus is a piece of code inserted into a software system that will set off a malicious function when specified conditions are met.
Choices
Choice (4) | Response | |
---|---|---|
a. | Spyware |
|
b. | Trojan Horses |
|
c. | Logic bombs |
|
d. | Question does not provide sufficient data or is vague |
|
Question number: 5
» Computer » Viruses and Antiviruses
Appeared in Year: 2014
Question
Which of the following methods is used by computer antivirus programs to detect unknown viruses as well as new variants of the viruses?
Choices
Choice (4) | Response | |
---|---|---|
a. | Rootkit detection |
|
b. | Real-time detection |
|
c. | Signature-based detection |
|
d. | Heuristic detection |
|