1.
What is a worm?
Correct Answer
A. A piece of software that replicates itself.
Explanation
A worm is a type of malicious software that is capable of replicating itself and spreading across computer networks without any user intervention. Unlike viruses, worms do not need to attach themselves to other programs or files in order to spread. Instead, they can independently exploit vulnerabilities in network protocols or operating systems to propagate and infect other computers. This self-replicating behavior allows worms to rapidly infect a large number of systems, causing widespread damage and disruption.
2.
Which of the following would be considered the best password?
Correct Answer
D. Something easy to remember, consisting of letters and numbers.
Something easy to remember, consisting of letters and numbers.
Explanation
The best password would be something that is easy to remember but also includes a combination of letters and numbers. This adds an extra layer of complexity and makes it harder for hackers to guess or crack the password. Using only letters or a word from the dictionary would be less secure as they are easier to guess. Including numbers adds more variability and makes the password stronger.
3.
A Trojan horse program pretends to be a different type of program.
Correct Answer
A. True
Explanation
A Trojan horse program is a type of malware that disguises itself as a legitimate or harmless program in order to deceive users and gain unauthorized access to their systems. It tricks users into thinking that it is something else, such as a game or utility software, while in reality, it carries out malicious activities in the background. Therefore, the statement "A Trojan horse program pretends to be a different type of program" is true.
4.
What is a macro virus?
Correct Answer
D. A virus that is hidden in a document file.
Explanation
A macro virus is a type of virus that is hidden within a document file. Unlike other viruses that target executable files, a macro virus specifically infects documents, such as those created in Microsoft Office programs. These viruses exploit the macro programming language used in these documents to execute malicious code and spread to other files. They often spread through email attachments or infected documents shared online. Once activated, a macro virus can cause various harmful effects, such as deleting or corrupting files, stealing personal information, or spreading to other computers. Therefore, the correct answer is that a macro virus is a virus hidden in a document file.
5.
You have received a virus via an e-mail attachment, but you haven’t opened the attachment yet. The virus could be damaging your computer already.
Correct Answer
B. False
Explanation
The statement is false because simply receiving a virus via an email attachment does not mean that it is already damaging your computer. In order for a virus to cause harm, it needs to be executed or opened on the computer. If the attachment hasn't been opened, the virus remains dormant and cannot cause any damage. It is important to exercise caution and not open suspicious attachments to prevent any potential harm to the computer.
6.
What does your anti-virus software actual do when it quarantines a virus?
Correct Answer
C. It removes the suspected virus and stores it in safe place.
Explanation
When the anti-virus software quarantines a virus, it removes the suspected virus from the system and stores it in a safe place. This action helps to isolate the virus and prevent it from causing any further harm to the computer. By storing it in a safe place, the anti-virus software ensures that the virus cannot spread or infect other files or programs on the system. This allows the user to safely remove the virus or restore the quarantined file if it was a false positive.
7.
How can you identify a virus on your computer?
Correct Answer
B. Your programs take longer to start or run more slowly than usual.
Explanation
When a computer is infected with a virus, one common symptom is that programs take longer to start or run more slowly than usual. This is because the virus can consume system resources and interfere with the normal functioning of programs. Therefore, this symptom can be an indicator that there is a virus on the computer.
8.
To maintain a efficient computer system you should:
Correct Answer
D. Install an antivirus software and update it regularly
Explanation
Installing an antivirus software and updating it regularly is important for maintaining an efficient computer system. Antivirus software helps to protect the system from viruses, malware, and other malicious threats that can cause damage and slow down the computer's performance. Regular updates ensure that the antivirus software has the latest virus definitions and security patches, enhancing its effectiveness in detecting and preventing new threats. By installing and updating antivirus software regularly, users can safeguard their computer system and maintain its efficiency.
9.
If you notice a sudden reduction in hard disk space, and you haven’t installed any new applications, this may indicate that your computer is infected with a virus.
Correct Answer
A. True
Explanation
If there is a sudden reduction in hard disk space without any new applications being installed, it suggests that the computer is infected with a virus. Viruses often consume disk space by creating unnecessary files or replicating themselves. This can lead to a decrease in available storage space on the hard drive. Therefore, the statement "True" is the correct answer.
10.
Your program takes longer to start or run more slowly than usual. If you discover this behavior you should:
Correct Answer
C. Run a full virus scan and heal the problem
Explanation
If your program takes longer to start or run more slowly than usual, it is a possible indication of a virus or malware infection. Running a full virus scan and healing the problem is the appropriate action to take in order to identify and remove any malicious software that may be causing the slow performance. Ignoring the issue or rebooting the system may not address the underlying problem, and searching the LAN for other e-mail users is unrelated to resolving a potential virus infection. Removing all floppy disks is also not relevant to addressing the slow program performance.