Multiple choice questions about computer viruses

In the following article, please join the Network Administrator to learn about computer viruses through the quiz below.

For computer users, viruses are the fear of many people. When your computer unfortunately gets infected with the virus it will put your computer at risk of losing all important data, slowing down your computer, causing system errors . In the following article please join Network administrators learn about this topic through the quiz below.

Question 1. The technique of stealing accounts with Keylog is often used by newbie Hacker users because:

a. Keylog is very strong in identifying user / password in outbound packets
b. Keylog is very powerful in detecting encrypted passwords (encrypt) or hashed (Hash)
c. Because most users are not interested in security issues and Anti Virus
d. It is difficult to be detected by Anti Virus programs

Question 2 . To execute a Trojan-Backdoor attack. Hackers will do:

a. Trojan Server is installed on the victim machine. Hacker controls with the Trojan Client
b. The hacker uses a Trojan Client, attacking the victim's computer through the ports received from Scanning technology.
c. Hackers use a Trojan Server, attack the victim's computer through ports received from Scanning technology.
d. Trojan Client is installed on the victim machine. Hacker controlled by Trojan Server

Question 3. Trojan is a type of attack method:

a. Direct intervention on the victim's machine for important information
b. Stealing data from online victims
c. Attack cripples the victim's network
d. Control the victim computer remotely via the built-in software on the victim's computer

Question 4 . Metasploit Framework is an attack tool that exploits the vulnerability to get Shell of the victim machine. Immediately after installation, running this tool is a problem: all typing commands on Metasploit are not executed. The reason is:

a. Do not connect to the victim machine.
b. Do not install Metasploit tool on drive C:
c. Because the victim machine does not allow attacks.
d. Because the Anti Virus software on the hacked device is blocked (blocked) is not enforced.

Question 5 . System Hacking is a type of attack method:

a. Control remote victim computer
b. Direct intervention on the victim's machine for important information
c. Attack cripples the victim's network
d. Stealing data from online victims

Question 6 . Sniffing is a type of attack method:

a. Control remote victim computer
b. Stealing data from online victims
c. Direct intervention on the victim's machine for important information
d. Attack cripples the victim's network

Question 7 . Computer viruses cannot spread through

a. Internet
b. CD
c. Flash memory card
d. USB storage

Question 8 . Which program is an antivirus program

a. Kaspersky
b. Microsoft Office
c. Outlook Express
d. Winrar

Question 9 . Why is it dangerous to open email attachments

a. Because e-mail attachments are a source of computer virus infection
b. Because when opening an attachment, the service must be paid
c. Because the attachment is large, the computer cannot hold it
d. For all the above reasons

Question 10 . What file types can spread viruses

a. EXE
b. COM
c. BAT
d. All files above

Question 11 What is a computer virus?

a. A disease that can spread to people when accessing the Internet
b. A program or program segment is capable of replicating or copying itself from one infected object to another
c. One person accesses another's computer to copy files in an invalid way
d. Answers B and C are correct

Question 12 Please choose the right statement in the following statements:

a. Just an antivirus software is able to kill all viruses.
b. At one point a virus scanning software only killed some
certain viruses
c. A virus scanning software only kills a single virus
d. Computers that are not connected to the Internet are not infected

Question 13 . Which routes spread computer viruses:

a. Via USB memory device, removable drive.
b. Through file copy
c. Via black web, through software crack, keygen
d. All 3 plans on

Verse 14 . Harm of computer viruses

a. Consume system resources.
b. Destroy or steal data
c. Irritating to users
d. All 3 plans on

Question 15 . Which programs are not antivirus programs?

a. Kaspersky
b. Norton AntilVirus
c. BKAV
d. Winrar

Answer:

1 C

2 A

3. D

4. D

5. B

6. B

7. B

8. A

9. A

10. D

11. B

12. B

13. D

14. D

15. D

See more:

  1. 9 most effective antivirus software for Windows today
  2. How to identify computers infected with viruses with 10 characteristic signs
  3. Answer these 5 questions before clicking on any link
3.7 ★ | 11 Vote