Security And Virus Management

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Educator2
E
Educator2
Community Contributor
Quizzes Created: 12 | Total Attempts: 25,300
Questions: 10 | Attempts: 449

SettingsSettingsSettings
Security And Virus Management - Quiz

Introduction to IT


Questions and Answers
  • 1. 

    What is a worm?

    • A.

      A piece of software that replicates itself.

    • B.

      A piece of software that stays dormant on CD-ROMs

    • C.

      A piece of software that destroys network cables.

    • D.

      A piece of software that destroys floppy disks

    Correct Answer
    A. A piece of software that replicates itself.
    Explanation
    A worm is a type of malicious software that is capable of replicating itself and spreading across computer networks without any user intervention. Unlike viruses, worms do not need to attach themselves to other programs or files in order to spread. Instead, they can independently exploit vulnerabilities in network protocols or operating systems to propagate and infect other computers. This self-replicating behavior allows worms to rapidly infect a large number of systems, causing widespread damage and disruption.

    Rate this question:

  • 2. 

    Which of the following would be considered the best password?

    • A.

      Something easy to remember, like your date of birth.

    • B.

      Something easy to remember, like a word from the dictionary.

    • C.

      Something easy to remember, consisting only of letters.

    • D.

      Something easy to remember, consisting of letters and numbers. Something easy to remember, consisting of letters and numbers.

    Correct Answer
    D. Something easy to remember, consisting of letters and numbers. Something easy to remember, consisting of letters and numbers.
    Explanation
    The best password would be something that is easy to remember but also includes a combination of letters and numbers. This adds an extra layer of complexity and makes it harder for hackers to guess or crack the password. Using only letters or a word from the dictionary would be less secure as they are easier to guess. Including numbers adds more variability and makes the password stronger.

    Rate this question:

  • 3. 

    A Trojan horse program pretends to be a different type of program.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A Trojan horse program is a type of malware that disguises itself as a legitimate or harmless program in order to deceive users and gain unauthorized access to their systems. It tricks users into thinking that it is something else, such as a game or utility software, while in reality, it carries out malicious activities in the background. Therefore, the statement "A Trojan horse program pretends to be a different type of program" is true.

    Rate this question:

  • 4. 

    What is a macro virus?

    • A.

      A virus that affects only executive files, such as program files.

    • B.

      A program that scans your computer’s hard disk for viruses.

    • C.

      A malicious program disguised as a different type of program.

    • D.

      A virus that is hidden in a document file.

    Correct Answer
    D. A virus that is hidden in a document file.
    Explanation
    A macro virus is a type of virus that is hidden within a document file. Unlike other viruses that target executable files, a macro virus specifically infects documents, such as those created in Microsoft Office programs. These viruses exploit the macro programming language used in these documents to execute malicious code and spread to other files. They often spread through email attachments or infected documents shared online. Once activated, a macro virus can cause various harmful effects, such as deleting or corrupting files, stealing personal information, or spreading to other computers. Therefore, the correct answer is that a macro virus is a virus hidden in a document file.

    Rate this question:

  • 5. 

    You have received a virus via an e-mail attachment, but you haven’t opened the attachment yet. The virus could be damaging your computer already.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because simply receiving a virus via an email attachment does not mean that it is already damaging your computer. In order for a virus to cause harm, it needs to be executed or opened on the computer. If the attachment hasn't been opened, the virus remains dormant and cannot cause any damage. It is important to exercise caution and not open suspicious attachments to prevent any potential harm to the computer.

    Rate this question:

  • 6. 

    What does your anti-virus software actual do when it quarantines a virus?

    • A.

      It automatically shuts down your operating system.

    • B.

      It de-fragments your hard drive.

    • C.

      It removes the suspected virus and stores it in safe place.

    • D.

      It removes the virus and sends it automatically to the anti-virus vendor.

    Correct Answer
    C. It removes the suspected virus and stores it in safe place.
    Explanation
    When the anti-virus software quarantines a virus, it removes the suspected virus from the system and stores it in a safe place. This action helps to isolate the virus and prevent it from causing any further harm to the computer. By storing it in a safe place, the anti-virus software ensures that the virus cannot spread or infect other files or programs on the system. This allows the user to safely remove the virus or restore the quarantined file if it was a false positive.

    Rate this question:

  • 7. 

    How can you identify a virus on your computer?

    • A.

      Your computer trips the main power supply

    • B.

      Your programs take longer to start or run more slowly than usual.

    • C.

      Your computer’s temperature increases

    • D.

      Your computer refuses to switch on.

    Correct Answer
    B. Your programs take longer to start or run more slowly than usual.
    Explanation
    When a computer is infected with a virus, one common symptom is that programs take longer to start or run more slowly than usual. This is because the virus can consume system resources and interfere with the normal functioning of programs. Therefore, this symptom can be an indicator that there is a virus on the computer.

    Rate this question:

  • 8. 

    To maintain a efficient computer system you should:

    • A.

      Pre-install your Operating System software regularly

    • B.

      Scan your computer for viruses regularly

    • C.

      Backup your files regularly

    • D.

      Install an antivirus software and update it regularly

    Correct Answer
    D. Install an antivirus software and update it regularly
    Explanation
    Installing an antivirus software and updating it regularly is important for maintaining an efficient computer system. Antivirus software helps to protect the system from viruses, malware, and other malicious threats that can cause damage and slow down the computer's performance. Regular updates ensure that the antivirus software has the latest virus definitions and security patches, enhancing its effectiveness in detecting and preventing new threats. By installing and updating antivirus software regularly, users can safeguard their computer system and maintain its efficiency.

    Rate this question:

  • 9. 

    If you notice a sudden reduction in hard disk space, and you haven’t installed any new applications, this may indicate that your computer is infected with a virus.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    If there is a sudden reduction in hard disk space without any new applications being installed, it suggests that the computer is infected with a virus. Viruses often consume disk space by creating unnecessary files or replicating themselves. This can lead to a decrease in available storage space on the hard drive. Therefore, the statement "True" is the correct answer.

    Rate this question:

  • 10. 

    Your program takes longer to start or run more slowly than usual. If you discover this behavior you should:

    • A.

      Ignore it and reboot your system.

    • B.

      Remove all floppy disks.

    • C.

      Run a full virus scan and heal the problem

    • D.

      Search your LAN for other e-mail users.

    Correct Answer
    C. Run a full virus scan and heal the problem
    Explanation
    If your program takes longer to start or run more slowly than usual, it is a possible indication of a virus or malware infection. Running a full virus scan and healing the problem is the appropriate action to take in order to identify and remove any malicious software that may be causing the slow performance. Ignoring the issue or rebooting the system may not address the underlying problem, and searching the LAN for other e-mail users is unrelated to resolving a potential virus infection. Removing all floppy disks is also not relevant to addressing the slow program performance.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 29, 2011
    Quiz Created by
    Educator2
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.