In this quiz you will be tested on general knowledge about virus and antivirus programs, usage infections etc.
It disapears
It loads
It works in a hidden manner
It destroys everything it finds
Rate this question:
Produce, reproduce, defense
Reproductive, attack, defense
Reproduce, clone, forward
Transform, create, design
Rate this question:
Students
Software making companies
Antivirus making companies
All of the above
None of the above
Rate this question:
Rate this question:
Rate this question:
Productive
Polymorphing
Forwarding
Polyductil
Rate this question:
Break Last Operating System
Before Loading the Operating Saloon
Before Leading the Organisms Social
Before Loading the Operating System
Rate this question:
Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc..
They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.
They are those who stay in the boot sector and to take control of the system when the computer is turned on.
They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.
Rate this question:
Recently emerging affect Word, Excel files that contain macros codes.
They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.
They are camouflaged as an application that performs a specific function and when executed their behavior is another. This applies to the "fake" antivirus.
They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.
Rate this question:
Rate this question:
Are programs designed to destroy antivirus programs
Are programs aimed at combating and eradicating computer viruses.
Are programs made to deviate your social networks
Are programs made to further enhance your computer's performance
Rate this question:
Reporting
Duplicating
Scanning
Following
Rate this question:
Partial analysis
Total analysis
Heuristic analysis
Complete analysis
Rate this question:
Chains or virus signatures
Access to contacts in our mail program
Instructed to try to replicate.
These are modules that are memory-resident antivirus, preventing the entry of any virus and controlling those operations that are deemed suspicious.
Memory loading
Memory-resident
Paralyzed to make any possible damage, if indeed it is a virus, or restore it when we are ensured that there is no virus.
Acting destructively
Paralyzes the possible damage of the virus
They provide technical improved heuristic analysis and improved protection by demons.
Make sure the infection is put into quarantine
We want to detect from the first memory load
Rate this question:
Because such an environment does not exist
Because such an environment is not friendly enough ... too many constraints, too many warnings, too many questions
Because such an environment is to easy to use
Because such an environment will not fully protect your computer
Rate this question:
A good antivirus could be one that protects only the hard drive of your computer
A good antivirus could be one that detects many viruses or that its security has a very powerful demon
A good antivirus could be one that detects only a few viruses
A good antivirus could be one that allows all programs to work without beiing disturbed
Rate this question:
Having a protection demon.
Have a module to verify the integrity of both files and boot sectors.
Option to make backup copies of infected files.
A and B
A, B, and C
Rate this question:
Rate this question:
Rate this question:
Rate this question:
Rate this question:
Rate this question:
Quiz Review Timeline (Updated): Aug 16, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.