Malware(Engineering > Computer Science And Engineering ) Questions and Answers
Question 1. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
Trojan Horse
Worm
Virus
Bots
Explanation:-
Answer: Option C. -> Virus
Question 2. What is Spyware?
Spyware is a type of malware installed on computers that collects information about users without their knowledge
The presence of spyware is typically hidden from the user and can be difficult to detect
Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else
All of the above
Explanation:-
Answer: Option D. -> All of the above
Question 3. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
Phishing
Eavesdropping
Scams
Exploits
Explanation:-
Answer: Option B. -> Eavesdropping
Question 4. What are the uses of Malware?
Many early infectious programs, including the first Internet Worm, were written as experiments or pranks
Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others
Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general
All of these
Explanation:-
Answer: Option D. -> All of these
Question 5. What is an antivirus?
A bigger and more dangerous virus
Software used to duplicate viruses
Computer software used to prevent, detect and remove malicious software
A biological agent that reproduces itself inside the cells of living things
Explanation:-
Answer: Option C. -> Computer software used to prevent, detect and remove malicious software
Question 6. What are the types of malware?
Caterpillars
Worms
Lions
Horses
Explanation:-
Answer: Option B. -> Worms
Question 7. Which of the following is a program capable of continually replicating with little or no user intervention?
Virus
Trojan horses
Rootkit
Worms
Explanation:-
Answer: Option A. -> Virus
Question 8. Which of the following is not a stand-alone program?
Trojan
Worm
Virus
Spyware
Explanation:-
Answer: Option C. -> Virus
Question 9. What is Trojan Horse?
A Trojan Horse program has the appearance of having a useful and desired function
A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer
A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort
All of the above
Explanation:-
Answer: Option D. -> All of the above
Question 10. What are the examples of Malware Spreads?