1.
What is a virus?
Correct Answer
C. It is a program that meets three essential characteristics. harmful, surreptitious, self-reproducing
Explanation
A virus is a type of program that meets three essential characteristics: harmful, surreptitious, and self-reproducing. This means that a virus is designed to cause damage to a computer system or data, it operates in a hidden or secretive manner, and it has the ability to replicate and spread itself to other files or systems. These characteristics distinguish a virus from other types of programs.
2.
A virus is surreptitious when........
Correct Answer
C. It works in a hidden manner
Explanation
A virus is considered surreptitious because it operates in a hidden manner, without the knowledge or detection of the user. It works discreetly, often disguising itself as legitimate software or hiding within the system, making it difficult to identify and remove. This stealthy behavior allows the virus to carry out its malicious activities, such as stealing sensitive information or causing damage, without being noticed by the user or antivirus programs.
3.
A virus is made up of three modes..........
Correct Answer
B. Reproductive, attack, defense
Explanation
A virus is made up of three modes: reproductive, attack, and defense. The reproductive mode allows the virus to replicate and create copies of itself within a host organism. The attack mode enables the virus to invade and infect host cells, causing harm and spreading the infection. The defense mode helps the virus evade the host's immune system and protect itself from being destroyed.
4.
Who makes viruses?
Correct Answer
D. All of the above
Explanation
The correct answer is "all of the above" because viruses can be created by anyone, including students, software making companies, and even antivirus making companies. While students may create viruses out of curiosity or for malicious purposes, software making companies may inadvertently create viruses due to coding errors or vulnerabilities in their software. Additionally, antivirus making companies may create viruses for research purposes in order to develop effective antivirus solutions. Therefore, all three options are possible sources of virus creation.
5.
According to investigations_________percent of viruses where made by human mistake.
Correct Answer
75
Explanation
The given statement suggests that investigations have found that 75% of viruses were made due to human mistakes. This implies that a significant majority of viruses are a result of human error rather than natural causes or external factors. This highlights the importance of human responsibility and caution in preventing the spread and creation of viruses.
6.
According to investigations__________percent of viruses where made to be viruses.
Correct Answer
25
Explanation
The given answer suggests that 25% of viruses were intentionally created to be viruses, based on investigations. This implies that a significant portion of viruses circulating are not accidental or naturally occurring, but rather intentionally designed to cause harm or disrupt systems.
7.
Third generation viruses are.........
Correct Answer
B. Polymorphing
Explanation
Third generation viruses are characterized by their ability to polymorph, which means they can change their code or appearance to evade detection by antivirus software. This allows them to constantly mutate and adapt, making it difficult for security systems to identify and eliminate them. This polymorphic behavior is a key feature of advanced viruses, enabling them to remain undetected and continue infecting systems.
8.
BLOS stands for....
Correct Answer
D. Before Loading the Operating System
Explanation
BLOS stands for "Before Loading the Operating System." This acronym is commonly used in the context of computer systems to refer to the initial stage of the boot process, where the computer's firmware performs basic hardware checks and prepares the system for loading the operating system. It is important to understand this acronym in order to have a clear understanding of the boot process and the sequence of events that occur before the operating system is loaded.
9.
What are Logic Bombs?
Correct Answer
A. Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc..
Explanation
Logic bombs are malicious code that are surreptitiously copied from the central system and remain dormant until an external event or alert activates them. This activation can be triggered by a combination of events or a specific date. Unlike viruses, logic bombs do not need a host to survive and primarily target networks. They can also reside in the boot sector and take control of the system when the computer is turned on. Additionally, logic bombs mainly attack executable (EXE) files, becoming active when these files are executed, loading into memory, and taking control of the system.
10.
What are Trojan Horses?
Correct Answer
C. They are camouflaged as an application that performs a specific function and when executed their behavior is another. This applies to the "fake" antivirus.
Explanation
Trojan Horses are malicious software that disguise themselves as legitimate applications with specific functions. However, when they are executed, their actual behavior is different from what is expected. This is similar to "fake" antivirus programs that claim to protect the system but instead cause harm. Unlike viruses, Trojan Horses do not require a host to survive and primarily target networks.
11.
Name a common virus.
Correct Answer
Michelangelo
Dir-2
Jerusalem
Gen-B
Diablo
Explanation
I gave you some 6 examples of virus names like "Friday 13" write on the space provided one of the other five.
12.
What are antivirus programs?
Correct Answer
B. Are programs aimed at combating and eradicating computer viruses.
Explanation
Antivirus programs are designed to combat and eradicate computer viruses. These programs are specifically created to detect, prevent, and remove malicious software from a computer system. They work by scanning files and programs for known virus signatures and suspicious behavior, and then taking appropriate actions to neutralize the threat. Antivirus programs play a crucial role in protecting computers and ensuring the security of personal and sensitive information.
13.
A computer detects a virus by______________.
Correct Answer
C. Scanning
Explanation
A computer detects a virus by scanning. Scanning refers to the process of examining the computer's files and programs for any malicious or suspicious code. This allows the computer to identify and locate any viruses present on the system. Scanning is an essential part of antivirus software and helps in detecting and removing viruses to ensure the computer's security.
14.
Virus detection is made when the computer does a _____________.
Correct Answer
C. Heuristic analysis
Explanation
Virus detection is made when the computer performs heuristic analysis. Heuristic analysis is a method used by antivirus software to identify and detect previously unknown viruses or malware by analyzing their behavior and characteristics. It involves looking for patterns and behaviors that are indicative of malicious activity, rather than relying solely on known virus signatures. This approach allows antivirus programs to identify and block new and emerging threats that may not have been detected before.
15.
What are protection demons.
Correct Answer
D. These are modules that are memory-resident antivirus, preventing the entry of any virus and controlling those operations that are deemed suspicious.
16.
When a virus is put in quarantine it is said to be.......
Correct Answer
C. Paralyzed to make any possible damage, if indeed it is a virus, or restore it when we are ensured that there is no virus.
17.
Antivirus databases are important because........
Correct Answer
B. They provide technical improved heuristic analysis and improved protection by demons.
Explanation
Antivirus databases are important because they provide technical improved heuristic analysis and improved protection by demons. This means that the databases contain information about known viruses and their behavior, allowing the antivirus software to detect and prevent infections. The heuristic analysis helps in identifying new and unknown viruses by analyzing their behavior patterns. The improved protection provided by the databases ensures that the antivirus software can effectively defend against the latest threats.
18.
Why don't users use a fully protected environment for the verification of digital signatures?
Correct Answer
B. Because such an environment is not friendly enough ... too many constraints, too many warnings, too many questions
Explanation
Users do not use a fully protected environment for the verification of digital signatures because such an environment is not friendly enough. It is likely to have too many constraints, warnings, and questions, which can make the process complicated and inconvenient for users.
19.
How can you choose a good antivirus program?
Correct Answer
B. A good antivirus could be one that detects many viruses or that its security has a very powerful demon
Explanation
A good antivirus program should be able to detect many viruses or have strong security measures in place. This means that it has a higher chance of identifying and removing various types of malware, providing better protection for your computer. Additionally, having a powerful security system or demon ensures that the antivirus program can effectively defend against new and emerging threats.
20.
Theese are features of a good antivirus program.
Correct Answer
E. A, B, and C
Explanation
A good antivirus program should have a protection demon to constantly monitor and detect any potential threats. It should also have a module to verify the integrity of both files and boot sectors to ensure that they have not been tampered with or infected. Additionally, having the option to make backup copies of infected files is important as it allows users to restore their files if they are mistakenly deleted or damaged during the cleaning process. Therefore, the correct answer is A, B, and C.
21.
____________________________is the most effective antivirus available at the moment.
Correct Answer
kaspersky
Explanation
Kaspersky is considered the most effective antivirus available at the moment. This is likely because it has a strong track record of detecting and removing various types of malware, including viruses, ransomware, and spyware. It also offers advanced features such as real-time protection, web filtering, and phishing protection. Kaspersky regularly updates its virus definitions to stay ahead of emerging threats, ensuring that users are protected against the latest malware. Additionally, it has a user-friendly interface and provides excellent customer support, making it a popular choice among individuals and businesses alike.
22.
A__________________________It is a method employed by many computer
antivirus programs designed to detect previously unknown computer viruses, as
well as new variants of viruses already in the wild
Correct Answer
heuristic analysis
Explanation
Heuristic analysis is a technique used by antivirus programs to identify unknown computer viruses and new variations of existing viruses. It involves analyzing the behavior and characteristics of files or programs to determine if they exhibit any suspicious or malicious activities. This method is effective in detecting viruses that have not been previously identified or have undergone modifications. By using heuristic analysis, antivirus software can proactively protect computer systems from emerging threats.
23.
A virus is__________________________when it has the power to make copies of itself.
Correct Answer
self-reproducing
selfreproducing
self reproducing
Explanation
A virus is considered self-reproducing when it has the ability to create duplicates of itself. This means that it can replicate its genetic material and produce new virus particles that are identical to the original virus. The terms "self-reproducing," "selfreproducing," and "self reproducing" all convey the same meaning in this context.
24.
According to the scale of damage caused by a virus, it can be grouped into_________________ and _____________________.
Correct Answer
benign malignant
Explanation
two words, they must be separated by a space for example(good bad)
25.
EXEVIR virus only attacks files with the extension ____________.
Correct Answer
.exe
exe
Explanation
The EXEVIR virus specifically targets files with the .exe extension. This means that it will only attack and infect executable files, which are files that can be directly executed or run on a computer. Other file types, such as documents or images, will not be affected by this virus.