Virus And Antivirus Quiz LA Estancia

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Maz30262002
M
Maz30262002
Community Contributor
Quizzes Created: 5 | Total Attempts: 9,775
| Attempts: 2,863 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. EXEVIR virus only attacks files with the extension ____________.

Explanation

The EXEVIR virus specifically targets files with the .exe extension. This means that it will only attack and infect executable files, which are files that can be directly executed or run on a computer. Other file types, such as documents or images, will not be affected by this virus.

Submit
Please wait...
About This Quiz
Virus And Antivirus Quiz LA Estancia - Quiz

In this quiz you will be tested on general knowledge about virus and antivirus programs, usage infections etc.

2. A computer detects a virus by______________.

Explanation

A computer detects a virus by scanning. Scanning refers to the process of examining the computer's files and programs for any malicious or suspicious code. This allows the computer to identify and locate any viruses present on the system. Scanning is an essential part of antivirus software and helps in detecting and removing viruses to ensure the computer's security.

Submit
3. What are antivirus programs?

Explanation

Antivirus programs are designed to combat and eradicate computer viruses. These programs are specifically created to detect, prevent, and remove malicious software from a computer system. They work by scanning files and programs for known virus signatures and suspicious behavior, and then taking appropriate actions to neutralize the threat. Antivirus programs play a crucial role in protecting computers and ensuring the security of personal and sensitive information.

Submit
4. What are protection demons.

Explanation

not-available-via-ai

Submit
5. BLOS stands for....

Explanation

BLOS stands for "Before Loading the Operating System." This acronym is commonly used in the context of computer systems to refer to the initial stage of the boot process, where the computer's firmware performs basic hardware checks and prepares the system for loading the operating system. It is important to understand this acronym in order to have a clear understanding of the boot process and the sequence of events that occur before the operating system is loaded.

Submit
6. When a virus is put in quarantine it is said to be.......

Explanation

not-available-via-ai

Submit
7. What is a virus?


Explanation

A virus is a type of program that meets three essential characteristics: harmful, surreptitious, and self-reproducing. This means that a virus is designed to cause damage to a computer system or data, it operates in a hidden or secretive manner, and it has the ability to replicate and spread itself to other files or systems. These characteristics distinguish a virus from other types of programs.

Submit
8. Who makes viruses?

Explanation

The correct answer is "all of the above" because viruses can be created by anyone, including students, software making companies, and even antivirus making companies. While students may create viruses out of curiosity or for malicious purposes, software making companies may inadvertently create viruses due to coding errors or vulnerabilities in their software. Additionally, antivirus making companies may create viruses for research purposes in order to develop effective antivirus solutions. Therefore, all three options are possible sources of virus creation.

Submit
9. How can you choose a good antivirus program?

Explanation

A good antivirus program should be able to detect many viruses or have strong security measures in place. This means that it has a higher chance of identifying and removing various types of malware, providing better protection for your computer. Additionally, having a powerful security system or demon ensures that the antivirus program can effectively defend against new and emerging threats.

Submit
10. A virus is surreptitious when........

Explanation

A virus is considered surreptitious because it operates in a hidden manner, without the knowledge or detection of the user. It works discreetly, often disguising itself as legitimate software or hiding within the system, making it difficult to identify and remove. This stealthy behavior allows the virus to carry out its malicious activities, such as stealing sensitive information or causing damage, without being noticed by the user or antivirus programs.

Submit
11. Third generation viruses are.........

Explanation

Third generation viruses are characterized by their ability to polymorph, which means they can change their code or appearance to evade detection by antivirus software. This allows them to constantly mutate and adapt, making it difficult for security systems to identify and eliminate them. This polymorphic behavior is a key feature of advanced viruses, enabling them to remain undetected and continue infecting systems.

Submit
12. According to investigations_________percent of viruses where made by human mistake.

Explanation

The given statement suggests that investigations have found that 75% of viruses were made due to human mistakes. This implies that a significant majority of viruses are a result of human error rather than natural causes or external factors. This highlights the importance of human responsibility and caution in preventing the spread and creation of viruses.

Submit
13. According to investigations__________percent of viruses where made to be viruses.

Explanation

The given answer suggests that 25% of viruses were intentionally created to be viruses, based on investigations. This implies that a significant portion of viruses circulating are not accidental or naturally occurring, but rather intentionally designed to cause harm or disrupt systems.

Submit
14. Antivirus databases are important because........

Explanation

Antivirus databases are important because they provide technical improved heuristic analysis and improved protection by demons. This means that the databases contain information about known viruses and their behavior, allowing the antivirus software to detect and prevent infections. The heuristic analysis helps in identifying new and unknown viruses by analyzing their behavior patterns. The improved protection provided by the databases ensures that the antivirus software can effectively defend against the latest threats.

Submit
15. What are Trojan Horses?

Explanation

Trojan Horses are malicious software that disguise themselves as legitimate applications with specific functions. However, when they are executed, their actual behavior is different from what is expected. This is similar to "fake" antivirus programs that claim to protect the system but instead cause harm. Unlike viruses, Trojan Horses do not require a host to survive and primarily target networks.

Submit
16. Why don't users use a fully protected environment for the verification of digital signatures?

Explanation

Users do not use a fully protected environment for the verification of digital signatures because such an environment is not friendly enough. It is likely to have too many constraints, warnings, and questions, which can make the process complicated and inconvenient for users.

Submit
17. A virus is made up of three modes..........

Explanation

A virus is made up of three modes: reproductive, attack, and defense. The reproductive mode allows the virus to replicate and create copies of itself within a host organism. The attack mode enables the virus to invade and infect host cells, causing harm and spreading the infection. The defense mode helps the virus evade the host's immune system and protect itself from being destroyed.

Submit
18. What are Logic Bombs?

Explanation

Logic bombs are malicious code that are surreptitiously copied from the central system and remain dormant until an external event or alert activates them. This activation can be triggered by a combination of events or a specific date. Unlike viruses, logic bombs do not need a host to survive and primarily target networks. They can also reside in the boot sector and take control of the system when the computer is turned on. Additionally, logic bombs mainly attack executable (EXE) files, becoming active when these files are executed, loading into memory, and taking control of the system.

Submit
19. ____________________________is the most effective antivirus available at the moment.

Explanation

Kaspersky is considered the most effective antivirus available at the moment. This is likely because it has a strong track record of detecting and removing various types of malware, including viruses, ransomware, and spyware. It also offers advanced features such as real-time protection, web filtering, and phishing protection. Kaspersky regularly updates its virus definitions to stay ahead of emerging threats, ensuring that users are protected against the latest malware. Additionally, it has a user-friendly interface and provides excellent customer support, making it a popular choice among individuals and businesses alike.

Submit
20. Theese are features of a good antivirus program.

Explanation

A good antivirus program should have a protection demon to constantly monitor and detect any potential threats. It should also have a module to verify the integrity of both files and boot sectors to ensure that they have not been tampered with or infected. Additionally, having the option to make backup copies of infected files is important as it allows users to restore their files if they are mistakenly deleted or damaged during the cleaning process. Therefore, the correct answer is A, B, and C.

Submit
21. Name a common virus.

Explanation

I gave you some 6 examples of virus names like "Friday 13" write on the space provided one of the other five.

Submit
22. A virus is__________________________when it has the power to make copies of itself.

Explanation

A virus is considered self-reproducing when it has the ability to create duplicates of itself. This means that it can replicate its genetic material and produce new virus particles that are identical to the original virus. The terms "self-reproducing," "selfreproducing," and "self reproducing" all convey the same meaning in this context.

Submit
23. Virus detection is made when the computer does a _____________.

Explanation

Virus detection is made when the computer performs heuristic analysis. Heuristic analysis is a method used by antivirus software to identify and detect previously unknown viruses or malware by analyzing their behavior and characteristics. It involves looking for patterns and behaviors that are indicative of malicious activity, rather than relying solely on known virus signatures. This approach allows antivirus programs to identify and block new and emerging threats that may not have been detected before.

Submit
24. According to the scale of damage caused by a virus, it can be grouped into_________________ and _____________________.

Explanation

two words, they must be separated by a space for example(good bad)

Submit
25. A__________________________It is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the wild

Explanation

Heuristic analysis is a technique used by antivirus programs to identify unknown computer viruses and new variations of existing viruses. It involves analyzing the behavior and characteristics of files or programs to determine if they exhibit any suspicious or malicious activities. This method is effective in detecting viruses that have not been previously identified or have undergone modifications. By using heuristic analysis, antivirus software can proactively protect computer systems from emerging threats.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 16, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 16, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2009
    Quiz Created by
    Maz30262002
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
EXEVIR virus only attacks files with the extension ____________.
A computer detects a virus by______________.
What are antivirus programs?
What are protection demons.
BLOS stands for....
When a virus is put in quarantine it is said to be.......
What is a virus?
Who makes viruses?
How can you choose a good antivirus program?
A virus is surreptitious when........
Third generation viruses are.........
According to investigations_________percent of viruses where made by...
According to investigations__________percent of viruses where made to...
Antivirus databases are important because........
What are Trojan Horses?
Why don't users use a fully protected environment for the verification...
A virus is made up of three modes..........
What are Logic Bombs?
____________________________is the most effective antivirus available...
Theese are features of a good antivirus program.
Name a common virus.
A virus is__________________________when it has the power to make...
Virus detection is made when the computer does a _____________.
According to the scale of damage caused by a virus, it can be grouped...
A__________________________It is a method employed by many computer ...
Alert!

Advertisement