Virus And Antivirus Quiz LA Estancia

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Maz30262002
M
Maz30262002
Community Contributor
Quizzes Created: 5 | Total Attempts: 9,008
Questions: 25 | Attempts: 2,356

SettingsSettingsSettings
Virus And Antivirus Quiz LA Estancia - Quiz

In this quiz you will be tested on general knowledge about virus and antivirus programs, usage infections etc.


Questions and Answers
  • 1. 

    What is a virus?

    • A.

      It is a program that meets three essential characteristics. Good, joyfull, performing

    • B.

      It is a program that meets three essential characteristics. performing, suspicious, productive

    • C.

      It is a program that meets three essential characteristics. harmful, surreptitious, self-reproducing

    • D.

      It is a program that meets three essential characteristics. forwarding, destructive, productive

    Correct Answer
    C. It is a program that meets three essential characteristics. harmful, surreptitious, self-reproducing
    Explanation
    A virus is a type of program that meets three essential characteristics: harmful, surreptitious, and self-reproducing. This means that a virus is designed to cause damage to a computer system or data, it operates in a hidden or secretive manner, and it has the ability to replicate and spread itself to other files or systems. These characteristics distinguish a virus from other types of programs.

    Rate this question:

  • 2. 

    A virus is surreptitious when........

    • A.

      It disapears

    • B.

      It loads

    • C.

      It works in a hidden manner

    • D.

      It destroys everything it finds

    Correct Answer
    C. It works in a hidden manner
    Explanation
    A virus is considered surreptitious because it operates in a hidden manner, without the knowledge or detection of the user. It works discreetly, often disguising itself as legitimate software or hiding within the system, making it difficult to identify and remove. This stealthy behavior allows the virus to carry out its malicious activities, such as stealing sensitive information or causing damage, without being noticed by the user or antivirus programs.

    Rate this question:

  • 3. 

    A virus is made up of three modes..........

    • A.

      Produce, reproduce, defense

    • B.

      Reproductive, attack, defense

    • C.

      Reproduce, clone, forward

    • D.

      Transform, create, design

    Correct Answer
    B. Reproductive, attack, defense
    Explanation
    A virus is made up of three modes: reproductive, attack, and defense. The reproductive mode allows the virus to replicate and create copies of itself within a host organism. The attack mode enables the virus to invade and infect host cells, causing harm and spreading the infection. The defense mode helps the virus evade the host's immune system and protect itself from being destroyed.

    Rate this question:

  • 4. 

    Who makes viruses?

    • A.

      Students

    • B.

      Software making companies

    • C.

      Antivirus making companies

    • D.

      All of the above

    • E.

      None of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "all of the above" because viruses can be created by anyone, including students, software making companies, and even antivirus making companies. While students may create viruses out of curiosity or for malicious purposes, software making companies may inadvertently create viruses due to coding errors or vulnerabilities in their software. Additionally, antivirus making companies may create viruses for research purposes in order to develop effective antivirus solutions. Therefore, all three options are possible sources of virus creation.

    Rate this question:

  • 5. 

    According to investigations_________percent of viruses where made by human mistake.

    Correct Answer
    75
    Explanation
    The given statement suggests that investigations have found that 75% of viruses were made due to human mistakes. This implies that a significant majority of viruses are a result of human error rather than natural causes or external factors. This highlights the importance of human responsibility and caution in preventing the spread and creation of viruses.

    Rate this question:

  • 6. 

    According to investigations__________percent of viruses where made to be viruses.

    Correct Answer
    25
    Explanation
    The given answer suggests that 25% of viruses were intentionally created to be viruses, based on investigations. This implies that a significant portion of viruses circulating are not accidental or naturally occurring, but rather intentionally designed to cause harm or disrupt systems.

    Rate this question:

  • 7. 

    Third generation viruses are.........

    • A.

      Productive

    • B.

      Polymorphing

    • C.

      Forwarding

    • D.

      Polyductil

    Correct Answer
    B. Polymorphing
    Explanation
    Third generation viruses are characterized by their ability to polymorph, which means they can change their code or appearance to evade detection by antivirus software. This allows them to constantly mutate and adapt, making it difficult for security systems to identify and eliminate them. This polymorphic behavior is a key feature of advanced viruses, enabling them to remain undetected and continue infecting systems.

    Rate this question:

  • 8. 

    BLOS stands for....

    • A.

      Break Last Operating System

    • B.

      Before Loading the Operating Saloon

    • C.

      Before Leading the Organisms Social

    • D.

      Before Loading the Operating System

    Correct Answer
    D. Before Loading the Operating System
    Explanation
    BLOS stands for "Before Loading the Operating System." This acronym is commonly used in the context of computer systems to refer to the initial stage of the boot process, where the computer's firmware performs basic hardware checks and prepares the system for loading the operating system. It is important to understand this acronym in order to have a clear understanding of the boot process and the sequence of events that occur before the operating system is loaded.

    Rate this question:

  • 9. 

    What are Logic Bombs?

    • A.

      Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc..

    • B.

      They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.

    • C.

      They are those who stay in the boot sector and to take control of the system when the computer is turned on.

    • D.

      They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.

    Correct Answer
    A. Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc..
    Explanation
    Logic bombs are malicious code that are surreptitiously copied from the central system and remain dormant until an external event or alert activates them. This activation can be triggered by a combination of events or a specific date. Unlike viruses, logic bombs do not need a host to survive and primarily target networks. They can also reside in the boot sector and take control of the system when the computer is turned on. Additionally, logic bombs mainly attack executable (EXE) files, becoming active when these files are executed, loading into memory, and taking control of the system.

    Rate this question:

  • 10. 

    What are Trojan Horses?

    • A.

      Recently emerging affect Word, Excel files that contain macros codes.

    • B.

      They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.

    • C.

      They are camouflaged as an application that performs a specific function and when executed their behavior is another. This applies to the "fake" antivirus.

    • D.

      They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.

    Correct Answer
    C. They are camouflaged as an application that performs a specific function and when executed their behavior is another. This applies to the "fake" antivirus.
    Explanation
    Trojan Horses are malicious software that disguise themselves as legitimate applications with specific functions. However, when they are executed, their actual behavior is different from what is expected. This is similar to "fake" antivirus programs that claim to protect the system but instead cause harm. Unlike viruses, Trojan Horses do not require a host to survive and primarily target networks.

    Rate this question:

  • 11. 

    Name a common virus.

    Correct Answer
    Michelangelo
    Dir-2
    Jerusalem
    Gen-B
    Diablo
    Explanation
    I gave you some 6 examples of virus names like "Friday 13" write on the space provided one of the other five.

    Rate this question:

  • 12. 

    What are antivirus programs?

    • A.

      Are programs designed to destroy antivirus programs

    • B.

      Are programs aimed at combating and eradicating computer viruses.

    • C.

      Are programs made to deviate your social networks

    • D.

      Are programs made to further enhance your computer's performance

    Correct Answer
    B. Are programs aimed at combating and eradicating computer viruses.
    Explanation
    Antivirus programs are designed to combat and eradicate computer viruses. These programs are specifically created to detect, prevent, and remove malicious software from a computer system. They work by scanning files and programs for known virus signatures and suspicious behavior, and then taking appropriate actions to neutralize the threat. Antivirus programs play a crucial role in protecting computers and ensuring the security of personal and sensitive information.

    Rate this question:

  • 13. 

    A computer detects a virus by______________.

    • A.

      Reporting

    • B.

      Duplicating

    • C.

      Scanning

    • D.

      Following

    Correct Answer
    C. Scanning
    Explanation
    A computer detects a virus by scanning. Scanning refers to the process of examining the computer's files and programs for any malicious or suspicious code. This allows the computer to identify and locate any viruses present on the system. Scanning is an essential part of antivirus software and helps in detecting and removing viruses to ensure the computer's security.

    Rate this question:

  • 14. 

    Virus detection is made when the computer does a _____________.

    • A.

      Partial analysis

    • B.

      Total analysis

    • C.

      Heuristic analysis

    • D.

      Complete analysis

    Correct Answer
    C. Heuristic analysis
    Explanation
    Virus detection is made when the computer performs heuristic analysis. Heuristic analysis is a method used by antivirus software to identify and detect previously unknown viruses or malware by analyzing their behavior and characteristics. It involves looking for patterns and behaviors that are indicative of malicious activity, rather than relying solely on known virus signatures. This approach allows antivirus programs to identify and block new and emerging threats that may not have been detected before.

    Rate this question:

  • 15. 

    What are protection demons.

    • A.

      Chains or virus signatures

    • B.

      Access to contacts in our mail program

    • C.

      Instructed to try to replicate.

    • D.

      These are modules that are memory-resident antivirus, preventing the entry of any virus and controlling those operations that are deemed suspicious.

    Correct Answer
    D. These are modules that are memory-resident antivirus, preventing the entry of any virus and controlling those operations that are deemed suspicious.
  • 16. 

    When a virus is put in quarantine it is said to be.......

    • A.

      Memory loading

    • B.

      Memory-resident

    • C.

      Paralyzed to make any possible damage, if indeed it is a virus, or restore it when we are ensured that there is no virus.

    • D.

      Acting destructively

    Correct Answer
    C. Paralyzed to make any possible damage, if indeed it is a virus, or restore it when we are ensured that there is no virus.
  • 17. 

    Antivirus databases are important because........

    • A.

      Paralyzes the possible damage of the virus

    • B.

      They provide technical improved heuristic analysis and improved protection by demons.

    • C.

      Make sure the infection is put into quarantine

    • D.

      We want to detect from the first memory load

    Correct Answer
    B. They provide technical improved heuristic analysis and improved protection by demons.
    Explanation
    Antivirus databases are important because they provide technical improved heuristic analysis and improved protection by demons. This means that the databases contain information about known viruses and their behavior, allowing the antivirus software to detect and prevent infections. The heuristic analysis helps in identifying new and unknown viruses by analyzing their behavior patterns. The improved protection provided by the databases ensures that the antivirus software can effectively defend against the latest threats.

    Rate this question:

  • 18. 

    Why don't users use a fully protected environment for the verification of digital signatures?

    • A.

      Because such an environment does not exist

    • B.

      Because such an environment is not friendly enough ... too many constraints, too many warnings, too many questions

    • C.

      Because such an environment is to easy to use

    • D.

      Because such an environment will not fully protect your computer

    Correct Answer
    B. Because such an environment is not friendly enough ... too many constraints, too many warnings, too many questions
    Explanation
    Users do not use a fully protected environment for the verification of digital signatures because such an environment is not friendly enough. It is likely to have too many constraints, warnings, and questions, which can make the process complicated and inconvenient for users.

    Rate this question:

  • 19. 

    How can you choose a good antivirus program?

    • A.

      A good antivirus could be one that protects only the hard drive of your computer

    • B.

      A good antivirus could be one that detects many viruses or that its security has a very powerful demon

    • C.

      A good antivirus could be one that detects only a few viruses

    • D.

      A good antivirus could be one that allows all programs to work without beiing disturbed

    Correct Answer
    B. A good antivirus could be one that detects many viruses or that its security has a very powerful demon
    Explanation
    A good antivirus program should be able to detect many viruses or have strong security measures in place. This means that it has a higher chance of identifying and removing various types of malware, providing better protection for your computer. Additionally, having a powerful security system or demon ensures that the antivirus program can effectively defend against new and emerging threats.

    Rate this question:

  • 20. 

    Theese are features of a good antivirus program.

    • A.

      Having a protection demon.

    • B.

      Have a module to verify the integrity of both files and boot sectors.

    • C.

      Option to make backup copies of infected files.

    • D.

      A and B

    • E.

      A, B, and C

    Correct Answer
    E. A, B, and C
    Explanation
    A good antivirus program should have a protection demon to constantly monitor and detect any potential threats. It should also have a module to verify the integrity of both files and boot sectors to ensure that they have not been tampered with or infected. Additionally, having the option to make backup copies of infected files is important as it allows users to restore their files if they are mistakenly deleted or damaged during the cleaning process. Therefore, the correct answer is A, B, and C.

    Rate this question:

  • 21. 

    ____________________________is the most effective antivirus available at the moment.

    Correct Answer
    kaspersky
    Explanation
    Kaspersky is considered the most effective antivirus available at the moment. This is likely because it has a strong track record of detecting and removing various types of malware, including viruses, ransomware, and spyware. It also offers advanced features such as real-time protection, web filtering, and phishing protection. Kaspersky regularly updates its virus definitions to stay ahead of emerging threats, ensuring that users are protected against the latest malware. Additionally, it has a user-friendly interface and provides excellent customer support, making it a popular choice among individuals and businesses alike.

    Rate this question:

  • 22. 

    A__________________________It is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the wild

    Correct Answer
    heuristic analysis
    Explanation
    Heuristic analysis is a technique used by antivirus programs to identify unknown computer viruses and new variations of existing viruses. It involves analyzing the behavior and characteristics of files or programs to determine if they exhibit any suspicious or malicious activities. This method is effective in detecting viruses that have not been previously identified or have undergone modifications. By using heuristic analysis, antivirus software can proactively protect computer systems from emerging threats.

    Rate this question:

  • 23. 

    A virus is__________________________when it has the power to make copies of itself.

    Correct Answer
    self-reproducing
    selfreproducing
    self reproducing
    Explanation
    A virus is considered self-reproducing when it has the ability to create duplicates of itself. This means that it can replicate its genetic material and produce new virus particles that are identical to the original virus. The terms "self-reproducing," "selfreproducing," and "self reproducing" all convey the same meaning in this context.

    Rate this question:

  • 24. 

    According to the scale of damage caused by a virus, it can be grouped into_________________ and _____________________.

    Correct Answer
    benign malignant
    Explanation
    two words, they must be separated by a space for example(good bad)

    Rate this question:

  • 25. 

    EXEVIR virus only attacks files with the extension ____________.

    Correct Answer
    .exe
    exe
    Explanation
    The EXEVIR virus specifically targets files with the .exe extension. This means that it will only attack and infect executable files, which are files that can be directly executed or run on a computer. Other file types, such as documents or images, will not be affected by this virus.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 12, 2009
    Quiz Created by
    Maz30262002
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.