What Do You Know About Viruses And Malware? Trivia Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Joel Brooker
J
Joel Brooker
Community Contributor
Quizzes Created: 3 | Total Attempts: 816
Questions: 10 | Attempts: 490

SettingsSettingsSettings
What Do You Know About Viruses And Malware? Trivia Quiz - Quiz

What do you know about viruses and malware? Computers are faced with a lot of threats, and programs such as viruses and malware put a user’s data at risk of being destroyed beyond repair or accessed by parties who will use it against the user. Do take the quiz and get to learn some more about such programs.


Questions and Answers
  • 1. 

    Which of the following are considered 'malware?'

    • A.

      Virus

    • B.

      Antivirus

    • C.

      Firewall

    • D.

      Trojan horse

    Correct Answer(s)
    A. Virus
    D. Trojan horse
    Explanation
    Both viruses and Trojan horses are considered forms of malware. Viruses are malicious programs that replicate themselves and infect other files or systems, causing damage or disruption. Trojan horses, on the other hand, are deceptive programs that appear harmless but actually contain malicious code that can harm or compromise a system. Antivirus and firewall, on the other hand, are security measures designed to protect against malware, including viruses and Trojan horses. Therefore, antivirus and firewall are not considered malware themselves.

    Rate this question:

  • 2. 

    Social engineering refers to:

    • A.

      Brilliant hackers exploiting security holes

    • B.

      Firewalls failing to close dangerous ports

    • C.

      Hacking by using a false identity

    • D.

      Hacking Twitter or Facebook

    Correct Answer
    C. Hacking by using a false identity
    Explanation
    Social engineering refers to the act of manipulating individuals to gain unauthorized access to sensitive information or systems. This is typically done by hackers who use deception, persuasion, or impersonation techniques to trick people into revealing confidential information or granting access to restricted areas. By using a false identity, hackers can exploit human vulnerabilities and bypass security measures, making it easier for them to carry out their malicious activities.

    Rate this question:

  • 3. 

    A virus can propagate by

    • A.

      Infecting humans with the virus

    • B.

      Computers being too close together

    • C.

      Not scanning a file that was emailed to you

    • D.

      Spilling water on your computer

    Correct Answer
    C. Not scanning a file that was emailed to you
    Explanation
    A virus can propagate by not scanning a file that was emailed to you because email attachments can contain malicious software that can infect your computer when opened. If you do not scan the file before opening it, you are putting your computer at risk of being infected by the virus.

    Rate this question:

  • 4. 

    Antivirus software includes these brands:

    • A.

      Norton Antivirus

    • B.

      McAfee Antivirus

    • C.

      Kaspersky

    • D.

      Windows Firewall

    Correct Answer(s)
    A. Norton Antivirus
    B. McAfee Antivirus
    C. Kaspersky
    Explanation
    The given answer lists three well-known brands of antivirus software: Norton Antivirus, McAfee Antivirus, and Kaspersky. These brands are widely recognized and trusted in the industry for their ability to protect computer systems from various types of malware, viruses, and other online threats. Windows Firewall, on the other hand, is not an antivirus software but rather a built-in security feature in the Windows operating system that helps protect against unauthorized access to a computer's network.

    Rate this question:

  • 5. 

    Regarding malware, a trojan horse

    • A.

      Is very large

    • B.

      Is too fast to chase

    • C.

      Has a large bell on the door

    • D.

      Leaves open security backdoors

    Correct Answer
    D. Leaves open security backdoors
    Explanation
    A trojan horse is a type of malware that disguises itself as a legitimate program or file. Unlike other types of malware, it does not replicate itself or spread to other systems. Instead, it tricks the user into downloading or executing it, allowing it to gain unauthorized access to the system. Once inside, a trojan horse can open security backdoors, which are vulnerabilities or weaknesses in the system's defenses. This allows the attacker to gain control over the system, steal sensitive information, or carry out other malicious activities without the user's knowledge.

    Rate this question:

  • 6. 

    A virus can erase files and send spam email.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A virus is a type of malicious software that can infect a computer system and cause harm. One of the ways it can do this is by erasing files, deleting important data stored on the computer. Additionally, viruses can also use the infected computer to send out spam emails, spreading the virus further and causing inconvenience to others. Therefore, the statement that a virus can erase files and send spam email is true.

    Rate this question:

  • 7. 

    A virus can slow down your system.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A virus can slow down your system because it can consume a significant amount of your computer's resources, such as memory and processing power. Viruses often run in the background without the user's knowledge, performing malicious activities like replicating themselves or stealing data. These activities can cause your system to become sluggish, resulting in slower performance and longer response times. Additionally, some viruses may also interfere with the functioning of important system files and programs, further contributing to the slowdown.

    Rate this question:

  • 8. 

    A computer virus can spread to humans.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A computer virus is a type of malicious software that is designed to infect and harm computer systems, not humans. Computer viruses cannot physically spread to humans as they are specifically created to target and exploit vulnerabilities in computer systems, networks, and software. While computer viruses can cause harm to individuals by compromising their personal information or causing financial loss, they cannot directly infect humans like biological viruses. Therefore, the statement that a computer virus can spread to humans is false.

    Rate this question:

  • 9. 

    The ILOVEYOU worm worked by exploiting a vulnerability in

    • A.

      The firewall

    • B.

      Visual Basic script

    • C.

      Javascript

    • D.

      HTML on the local machine

    Correct Answer
    B. Visual Basic script
    Explanation
    The ILOVEYOU worm exploited a vulnerability in Visual Basic script. This means that the worm was able to take advantage of a weakness in the Visual Basic scripting language to infect and spread on the local machine. By exploiting this vulnerability, the worm was able to cause widespread damage and spread rapidly through email attachments.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 16, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 01, 2012
    Quiz Created by
    Joel Brooker
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.