Virus And Antivirus Quiz LA Estancia

25 Questions | Total Attempts: 1506

SettingsSettingsSettings
Virus And Antivirus Quiz LA Estancia - Quiz

In this quiz you will be tested on general knowledge about virus and antivirus programs, usage infections etc.


Questions and Answers
  • 1. 
    What is a virus?
    • A. 

      It is a program that meets three essential characteristics. Good, joyfull, performing

    • B. 

      It is a program that meets three essential characteristics. performing, suspicious, productive

    • C. 

      It is a program that meets three essential characteristics. harmful, surreptitious, self-reproducing

    • D. 

      It is a program that meets three essential characteristics. forwarding, destructive, productive

  • 2. 
    A virus is surreptitious when........
    • A. 

      It disapears

    • B. 

      It loads

    • C. 

      It works in a hidden manner

    • D. 

      It destroys everything it finds

  • 3. 
    A virus is made up of three modes..........
    • A. 

      Produce, reproduce, defense

    • B. 

      Reproductive, attack, defense

    • C. 

      Reproduce, clone, forward

    • D. 

      Transform, create, design

  • 4. 
    Who makes viruses?
    • A. 

      Students

    • B. 

      Software making companies

    • C. 

      Antivirus making companies

    • D. 

      All of the above

    • E. 

      None of the above

  • 5. 
    According to investigations_________percent of viruses where made by human mistake.
  • 6. 
    According to investigations__________percent of viruses where made to be viruses.
  • 7. 
    Third generation viruses are.........
    • A. 

      Productive

    • B. 

      Polymorphing

    • C. 

      Forwarding

    • D. 

      Polyductil

  • 8. 
    BLOS stands for....
    • A. 

      Break Last Operating System

    • B. 

      Before Loading the Operating Saloon

    • C. 

      Before Leading the Organisms Social

    • D. 

      Before Loading the Operating System

  • 9. 
    What are Logic Bombs?
    • A. 

      Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc..

    • B. 

      They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.

    • C. 

      They are those who stay in the boot sector and to take control of the system when the computer is turned on.

    • D. 

      They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.

  • 10. 
    What are Trojan Horses?
    • A. 

      Recently emerging affect Word, Excel files that contain macros codes.

    • B. 

      They attack mainly. EXE files as they are executed, the virus becomes active, it loads into memory and takes control of the system.

    • C. 

      They are camouflaged as an application that performs a specific function and when executed their behavior is another. This applies to the "fake" antivirus.

    • D. 

      They differ from viruses in that they do not need a host to survive. It mainly attacks on networks.

  • 11. 
    Name a common virus.
  • 12. 
    What are antivirus programs?
    • A. 

      Are programs designed to destroy antivirus programs

    • B. 

      Are programs aimed at combating and eradicating computer viruses.

    • C. 

      Are programs made to deviate your social networks

    • D. 

      Are programs made to further enhance your computer's performance

  • 13. 
    A computer detects a virus by______________.
    • A. 

      Reporting

    • B. 

      Duplicating

    • C. 

      Scanning

    • D. 

      Following

  • 14. 
    Virus detection is made when the computer does a _____________.
    • A. 

      Partial analysis

    • B. 

      Total analysis

    • C. 

      Heuristic analysis

    • D. 

      Complete analysis

  • 15. 
    What are protection demons.
    • A. 

      Chains or virus signatures

    • B. 

      Access to contacts in our mail program

    • C. 

      Instructed to try to replicate.

    • D. 

      These are modules that are memory-resident antivirus, preventing the entry of any virus and controlling those operations that are deemed suspicious.

  • 16. 
    When a virus is put in quarantine it is said to be.......
    • A. 

      Memory loading

    • B. 

      Memory-resident

    • C. 

      Paralyzed to make any possible damage, if indeed it is a virus, or restore it when we are ensured that there is no virus.

    • D. 

      Acting destructively

  • 17. 
    Antivirus databases are important because........
    • A. 

      Paralyzes the possible damage of the virus

    • B. 

      They provide technical improved heuristic analysis and improved protection by demons.

    • C. 

      Make sure the infection is put into quarantine

    • D. 

      We want to detect from the first memory load

  • 18. 
    Why don't users use a fully protected environment for the verification of digital signatures?
    • A. 

      Because such an environment does not exist

    • B. 

      Because such an environment is not friendly enough ... too many constraints, too many warnings, too many questions

    • C. 

      Because such an environment is to easy to use

    • D. 

      Because such an environment will not fully protect your computer

  • 19. 
    How can you choose a good antivirus program?
    • A. 

      A good antivirus could be one that protects only the hard drive of your computer

    • B. 

      A good antivirus could be one that detects many viruses or that its security has a very powerful demon

    • C. 

      A good antivirus could be one that detects only a few viruses

    • D. 

      A good antivirus could be one that allows all programs to work without beiing disturbed

  • 20. 
    Theese are features of a good antivirus program.
    • A. 

      Having a protection demon.

    • B. 

      Have a module to verify the integrity of both files and boot sectors.

    • C. 

      Option to make backup copies of infected files.

    • D. 

      A and B

    • E. 

      A, B, and C

  • 21. 
    ____________________________is the most effective antivirus available at the moment.
  • 22. 
    A__________________________It is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the wild
  • 23. 
    A virus is__________________________when it has the power to make copies of itself.
  • 24. 
    According to the scale of damage caused by a virus, it can be grouped into_________________ and _____________________.
  • 25. 
    EXEVIR virus only attacks files with the extension ____________.