Computer-Viruses and Antiviruses (NCO- Cyber Olympiad (SOF) Class 12): Questions 1 - 6 of 21

Access detailed explanations (illustrated with images and videos) to 520 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 350.00 or

How to register?

Question number: 1

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ________.

Choices

Choice (4) Response

a.

Phishing

b.

Exploits

c.

Scams

d.

Eavesdropping

Question number: 2

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

________ Viruses are Either Redirects the Disk head to Read Another Sector Instead of the one in which they Reside.

Choices

Choice (4) Response

a.

Stealth

b.

Multipartite

c.

Master boot record

d.

Polymorphic

Question number: 3

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

Which of the following is considered the first Macro virus that attacked Microsoft Word documents?

Choices

Choice (4) Response

a.

Concept

b.

Dendroid

c.

SQLInjection

d.

CIH

Question number: 4

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

Identify the following.

- It is a computer program that replicates itself.

- It includes a code called payload to delete the files.

- Morris and Code Red are its examples.

Choices

Choice (4) Response

a.

Worm

b.

Trojan

c.

Virus

d.

Brain

Question number: 5

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

Cascade and Sunday are examples of ________ virus.

Choices

Choice (4) Response

a.

Program

b.

Macro

c.

Boot Sector

d.

Question does not provide sufficient data or is vague

Question number: 6

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

________ are Computer Programs that are Designed by Attackers to Gain Root or Administrative Access to your Computer.

Choices

Choice (4) Response

a.

Antiware

b.

Malware

c.

Backdoors

d.

Rootkits

Developed by: