In this quiz you will be tested on general knowledge about virus and antivirus programs, usage infections etc.
It is a program that meets three essential characteristics. Good, joyfull, performing
It is a program that meets three essential characteristics. performing, suspicious, productive
It is a program that meets three essential characteristics. harmful, surreptitious, self-reproducing
It is a program that meets three essential characteristics. forwarding, destructive, productive
It disapears
It loads
It works in a hidden manner
It destroys everything it finds
Produce, reproduce, defense
Reproductive, attack, defense
Reproduce, clone, forward
Transform, create, design
Students
Software making companies
Antivirus making companies
All of the above
None of the above
Productive
Polymorphing
Forwarding
Polyductil
Break Last Operating System
Before Loading the Operating Saloon
Before Leading the Organisms Social
Before Loading the Operating System
Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc..
They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.
They are those who stay in the boot sector and to take control of the system when the computer is turned on.
They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.
Recently emerging affect Word, Excel files that contain macros codes.
They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.
They are camouflaged as an application that performs a specific function and when executed their behavior is another. This applies to the "fake" antivirus.
They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.
Are programs designed to destroy antivirus programs
Are programs aimed at combating and eradicating computer viruses.
Are programs made to deviate your social networks
Are programs made to further enhance your computer's performance
Reporting
Duplicating
Scanning
Following
Partial analysis
Total analysis
Heuristic analysis
Complete analysis
Chains or virus signatures
Access to contacts in our mail program
Instructed to try to replicate.
These are modules that are memory-resident antivirus, preventing the entry of any virus and controlling those operations that are deemed suspicious.
Memory loading
Memory-resident
Paralyzed to make any possible damage, if indeed it is a virus, or restore it when we are ensured that there is no virus.
Acting destructively
Paralyzes the possible damage of the virus
They provide technical improved heuristic analysis and improved protection by demons.
Make sure the infection is put into quarantine
We want to detect from the first memory load
Because such an environment does not exist
Because such an environment is not friendly enough ... too many constraints, too many warnings, too many questions
Because such an environment is to easy to use
Because such an environment will not fully protect your computer
A good antivirus could be one that protects only the hard drive of your computer
A good antivirus could be one that detects many viruses or that its security has a very powerful demon
A good antivirus could be one that detects only a few viruses
A good antivirus could be one that allows all programs to work without beiing disturbed
Having a protection demon.
Have a module to verify the integrity of both files and boot sectors.
Option to make backup copies of infected files.
A and B
A, B, and C