How Internet Security Fights Off PC Invaders

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Calland36
C
Calland36
Community Contributor
Quizzes Created: 1 | Total Attempts: 107
Questions: 13 | Attempts: 107

SettingsSettingsSettings
How Internet Security Fights Off PC Invaders - Quiz


How Internet Security Fights Off PC Invaders


Questions and Answers
  • 1. 

    What is a virus?

    • A.

      A typically small piece of software that is attached onto other programs

    • B.

      Usually a large program that infects every part of your computer

    • C.

      A single file that is downloaded and does not spread

    Correct Answer
    A. A typically small piece of software that is attached onto other programs
    Explanation
    A virus is a typically small piece of software that is attached onto other programs. This means that it is not a standalone program, but rather it piggybacks onto existing software. Once attached, the virus can replicate itself and spread to other programs or files, causing harm to the computer system. This method of infection allows viruses to easily spread and infect multiple files or computers, making them a common threat in the digital world.

    Rate this question:

  • 2. 

    What ways are viruses transported?

    • A.

      E-mail

    • B.

      Music downloads

    • C.

      Cookies

    • D.

      Dirty hands

    Correct Answer(s)
    A. E-mail
    B. Music downloads
    C. Cookies
    Explanation
    Viruses can be transported through various means such as email, music downloads, and cookies. Email attachments can contain malicious files that can infect a computer when opened. Similarly, downloading music from untrusted sources can lead to the inadvertent download of infected files. Additionally, cookies, which are small files stored on a user's computer by websites, can be manipulated by hackers to deliver malware. Therefore, it is important to exercise caution when engaging in these activities to prevent virus transmission.

    Rate this question:

  • 3. 

    A Trojan Horse is a type of virus.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A Trojan Horse is a type of malware that disguises itself as a legitimate program or file in order to gain unauthorized access to a computer system. It is often used by hackers to steal sensitive information or to gain control over a computer. While a Trojan Horse is often referred to as a virus, it is technically not a virus itself. However, it is still considered a type of malware, making the statement "A Trojan Horse is a type of virus" true.

    Rate this question:

  • 4. 

    What does a computer Worm do?

    • A.

      It uses computer networks and security holes to replicate itself

    • B.

      It is an actual worm that can get inside a computer and ruin the hardware

    • C.

      A virus that looks like a worm and "eats" your software

    Correct Answer
    A. It uses computer networks and security holes to replicate itself
    Explanation
    A computer worm is a type of malicious software that is designed to self-replicate and spread across computer networks. Unlike viruses, worms do not need to attach themselves to an existing program or file to infect a computer. Instead, they take advantage of security vulnerabilities to automatically replicate and spread to other computers. This can cause significant damage to computer systems and networks by consuming bandwidth, slowing down systems, and potentially compromising sensitive information.

    Rate this question:

  • 5. 

    The way a virus travels through your e-mail is by an Attachment.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A virus can indeed travel through email attachments. When an infected attachment is opened or downloaded, the virus can gain access to the recipient's computer system and potentially cause harm. It is important to exercise caution when opening attachments from unknown or suspicious sources to avoid falling victim to a virus or malware attack.

    Rate this question:

  • 6. 

    What yead did the ILOVEYOU virus appear?

    • A.

      1990

    • B.

      2000

    • C.

      2010

    Correct Answer
    B. 2000
    Explanation
    The ILOVEYOU virus appeared in the year 2000.

    Rate this question:

  • 7. 

    A firewall is considered a Antivirus Software

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A firewall is not considered antivirus software. While both are security measures, they serve different purposes. A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, protecting against unauthorized access and potential threats. On the other hand, antivirus software is designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojans, from a computer system. It scans files and programs for known patterns of malicious code and takes actions to quarantine or remove them.

    Rate this question:

  • 8. 

    What is one way a hacker can break into your PC?

    • A.

      A hacker will locate your IP address and target low security computers

    • B.

      The will take a picture of your computer and use that to access it later on

    • C.

      They will search for the highest security computer, and try to access it.

    Correct Answer
    A. A hacker will locate your IP address and target low security computers
    Explanation
    A hacker can break into your PC by locating your IP address and targeting low security computers. This is because the IP address acts as a unique identifier for your computer on the internet, and if the hacker can find it, they can then focus their efforts on finding vulnerabilities in computers with low security measures in place. By exploiting these vulnerabilities, the hacker can gain unauthorized access to your PC and potentially steal sensitive information or cause damage.

    Rate this question:

  • 9. 

    What choice(s) are the key targets for computer hackers

    • A.

      Computers that have not been updates

    • B.

      Computers with old software on it

    • C.

      Computers lacking in virus protection

    Correct Answer(s)
    A. Computers that have not been updates
    B. Computers with old software on it
    C. Computers lacking in virus protection
    Explanation
    Computer hackers target computers that have not been updated, computers with old software, and computers lacking in virus protection because these vulnerabilities provide an opportunity for hackers to exploit. Outdated software and lack of updates often mean that the computer's security features are not up to date, making it easier for hackers to find and exploit vulnerabilities. Similarly, computers lacking in virus protection are more susceptible to malware and other malicious attacks, providing hackers with an entry point to gain unauthorized access or steal sensitive information.

    Rate this question:

  • 10. 

    Their is only 1 kind of anti-virus available to the public.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because there are multiple kinds of anti-virus software available to the public. There are various companies and developers that offer different anti-virus programs with different features and capabilities. Users can choose from a range of options based on their specific needs and preferences. Therefore, the statement that there is only 1 kind of anti-virus available to the public is incorrect.

    Rate this question:

  • 11. 

    All legitamate virus protection costs money

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "All legitimate virus protection costs money" is false because there are many legitimate virus protection options available for free. While some antivirus software may require a paid subscription for additional features or advanced protection, there are reputable free antivirus programs that offer basic protection against viruses and malware. Therefore, it is not true that all legitimate virus protection costs money.

    Rate this question:

  • 12. 

    The best way to avoid viruses in e-mails is to not open up junk mail, and to avoid suspicious e-mail senders or subjects.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because opening junk mail or emails from suspicious senders or with suspicious subjects increases the risk of getting viruses. By not opening these types of emails, one can significantly reduce the chances of getting infected with viruses.

    Rate this question:

  • 13. 

    Why is all of this important for digital artists?

    • A.

      Viruses can damage software.

    • B.

      Viruses can corrupt files in your computer and destroy important documents.

    • C.

      Viruses can infect important OS files that shut down computers.

    Correct Answer(s)
    A. Viruses can damage software.
    B. Viruses can corrupt files in your computer and destroy important documents.
    C. Viruses can infect important OS files that shut down computers.
    Explanation
    Digital artists rely heavily on software and computer systems to create their artwork. If their software gets damaged by viruses, it can hinder their ability to work efficiently and effectively. Additionally, if viruses corrupt files in their computer, it can result in the loss of important documents and artwork. Moreover, if viruses infect important OS files that shut down computers, it can disrupt their workflow and cause significant downtime. Therefore, understanding the importance of protecting against viruses is crucial for digital artists to ensure the safety and integrity of their work.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 13, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 13, 2011
    Quiz Created by
    Calland36
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.