Home / CSE MCQs / Malware ::

CSE MCQs :: Malware

  1. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
  2. A.
    Trojan Horse
    B.
    Worm
    C.
    Virus
    D.
    Bots

  3. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
  4. A.
    Phishing
    B.
    Eavesdropping
    C.
    Scams
    D.
    Exploits

  5. What is an antivirus?
  6. A.
    A bigger and more dangerous virus
    B.
    Software used to duplicate viruses
    C.
    Computer software used to prevent, detect and remove malicious software
    D.
    A biological agent that reproduces itself inside the cells of living things

  7. What is Spyware?
  8. A.
    Spyware is a type of malware installed on computers that collects information about users without their knowledge
    B.
    The presence of spyware is typically hidden from the user and can be difficult to detect
    C.
    Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else
    D.
    All of the above

  9. What are the uses of Malware?
  10. A.
    Many early infectious programs, including the first Internet Worm, were written as experiments or pranks
    B.
    Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others
    C.
    Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general
    D.
    All of these

  11. What are the types of malware?
  12. A.
    Caterpillars
    B.
    Worms
    C.
    Lions
    D.
    Horses

  13. Which of the following is not a stand-alone program?
  14. A.
    Trojan
    B.
    Worm
    C.
    Virus
    D.
    Spyware

  15. What is Trojan Horse?
  16. A.
    A Trojan Horse program has the appearance of having a useful and desired function
    B.
    A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer
    C.
    A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort
    D.
    All of the above

  17. Which of the following is a program capable of continually replicating with little or no user intervention?
  18. A.
    Virus
    B.
    Trojan horses
    C.
    Rootkit
    D.
    Worms

  19. What are the examples of Malware Spreads?
  20. A.
    Social network
    B.
    Pirated software
    C.
    Removable media
    D.
    All of the above