Practice Set 3 question answer - computer mcq Online Quiz (set-1) For All Competitive Exams

Q-1)   Some viruses have delayed payload, which is sometimes called a

(a)

(b)

(c)

(d)

(e)


Q-2)   The first PC virus was developed in

(a)

(b)

(c)

(d)

(e)


Q-3)   A program designed to destroy data on your computer which can travel to “infect” other computers is called a __________.

(a)

(b)

(c)

(d)

(e)


Q-4)   A program designed to destroy data on your compute which can travel to infect other computers, is called is

(a)

(b)

(c)

(d)

(e)

Explanation:

A computer virus is a kind of malicious computer program, which when executed, replicates itself and inserts its own code. When the replication is done, this code infects the other files and programs present on your system. 

These computer viruses are present in various types and each of them can infect a device in a different manner. 


Q-5)   There are several primary categories of procedures. Which of the following is not a primary category of procedures?

(a)

(b)

(c)

(d)

(e)

Explanation:

Firewall development is not a primary category of procedures.

Firewalls are defined as software or hardware device installed at the point where a network connection enters an internal network. We proposed and developed an improved software-based solution that allows all the inbound and outbound traffic to pass through the firewall.


Q-6)   A ____ is a small program embedded inside of a GIF image.

(a)

(b)

(c)

(d)

(e)

Explanation:


Q-7)   The phrase ____ describes viruses, worms, Trojan horse attack applets and attack scripts.

(a)

(b)

(c)

(d)

(e)

Explanation:

Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for malicious software.


Q-8)   These hacker breaks security for altruistic or at least non-malicious reasons.

(a)

(b)

(c)

(d)

Explanation:

A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers -- or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking. 

White hat hackers only seek vulnerabilities or exploits when they are legally permitted to do so. White hat hackers may do their research on open source software, as well as on software or systems they own or have been authorized to investigate, including products and services that operate bug bounty programs. These types of programs reward individuals with money for disclosing security flaws.


Q-9)   Which one of the following is a key function of firewall?

(a)

(b)

(c)

(d)

(e)

Explanation:

A firewall is a network security system in a computer which monitors and controls the network traffics. It establishes a barrier between a trusted internal network and an untrusted external network like the internet.


Q-10)   Which virus spreads in application software?

(a)

(b)

(c)

(d)

(e)

Explanation:

A macro virus is a computer virus written in the same macro language used to create software programs such as Microsoft Excel or Word. It centres on software applications and does not depend on the operating system (OS). As a result, it can infect any computer running any kind of OS, including Windows, macOS and Linux.