Virus, Spyware And Worm

44 Questions | Total Attempts: 364

SettingsSettingsSettings
Please wait...
Spyware Quizzes & Trivia

This is a quiz for all the computer lovers out there. If you want to test your knowledge on this specific program designed to deal with computer viruses take this quiz and find out how vast your knowledge is.


Questions and Answers
  • 1. 
     a computer program that can copy itself  and infect a computer
    • A. 

      Spyware

    • B. 

      Virus

    • C. 

      Worm

  • 2. 
    Which virus  first detected on ARPANET, the forerunner of the Internet, in the early 1970s?
    • A. 

      Elk Cloner

    • B. 

      Macro

    • C. 

      Creeper

  • 3. 
    Which is responsible for finding new files to infect, also called  finder module
    • A. 

      Resident viruses

    • B. 

      Nonresident viruses

    • C. 

      Both

  • 4. 
    Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets.
    • A. 

      Elk Cloner

    • B. 

      Macro

    • C. 

      Creeper

  • 5. 
    Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files, They're  called...
    • A. 

      Cavity viruses

    • B. 

      Virus signatures

    • C. 

      virus scanner

  • 6. 
    Which was the first technique that posed a serious threat to virus scanners. Just like regular encrypted viruses, the virus infects files with an encrypted copy of itself, which is decoded by a decryption module?
    • A. 

      Metamorphic code

    • B. 

      Polymorphic code

  • 7. 
     Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as....
    • A. 

      Software

    • B. 

      Program

    • C. 

      System Restore

  • 8. 
    Upon executing infected EXE, this infects another EXE in current directory by making a hidden COM file with same base name.
    • A. 

      Clust

    • B. 

      Acme

    • C. 

      Lisbon

  • 9. 
    Also known as Abraxas5, discovered in April 1993, is an encrypted, overwriting, file infecting computer virus which infects .COM and .EXE files, although it does not infect command.com. It does not become memory resident. Each time an infected file is executed, Abraxas infects the copy of dosshell.com located in the C:\DOS directory (creating the file if it does not exist), as well as one EXE file in the current directory. Due to a bug in the virus, only the first EXE file in any directory is infected.
    • A. 

      S-847

    • B. 

      Liquid Code - 2

    • C. 

      Abraxas

  • 10. 
    It is a memory-resident, file-infecting computer virus which infects EXE files and may alter both COM and EXE files. It activates on the 13th day of every month. Upon infection, It becomes memory-resident at the top of system memory but below the 640K DOS boundary and hooks interrupts 16 and 1C. The copy of command.com pointed to by the COMSPEC environment variable may also be altered. It infects/alters COM and EXE files as they are executed.
    • A. 

      ABC

    • B. 

      Madcow

    • C. 

      Sakora

  • 11. 
    It is a G2-generated encrypted computer virus which infects .COM and .EXE files but not command.com. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.
    • A. 

      Egg

    • B. 

      Actifed

    • C. 

      LixoNuke

  • 12. 
    It is a computer virus that can affect any of the DOS operating systems.It was first discovered in 1991
    • A. 

      Sunday

    • B. 

      Nygus-KL

    • C. 

      Ada

  • 13. 
    It is a memory resident, file infecting computer virus which infects .COM and .EXE files, including command.com. It was discovered in Spain in September, 1992
    • A. 

      No-Int

    • B. 

      Agena

    • C. 

      AIDS

  • 14. 
    It was a memory resident DOS file infector first isolated at the Agiplan software company in Germany
    • A. 

      AGI-Plan

    • B. 

      Neznamy

    • C. 

      Vote/Vote1000

  • 15. 
    "Your computer is infected with ... `xff`x03 Aids Virus II `xff`x03 - Signed WOP & PGT of DutchCrack -"
    • A. 

      AIDS

    • B. 

      AIDS II

    • C. 

      Both

  • 16. 
    A number of symptoms are associated with it:
    • EXE files will increase by 1,560 bytes in size upon infection.
    • On Fridays, It will begin to modify the File Allocation Table. As a result, when a file is executed, another may appear in its place. This is potentially dangerous. For more information, see the payload section.
    • One hour after an infected program is run, Alabama will bring up a flashing box with the text "SOFTWARE COPIES PROHIBITED BY INTERNATIONAL LAW..............Box 1055 Tuscambia ALABAMA USA."
  • A. 

    Anna

  • B. 

    Alabama

  • C. 

    Alabama 2

  • 17. 
    A computer virus that was discovered to be spreading in Europe in 1997. It is a boot virus.Also ASY
    • A. 

      Fich897

    • B. 

      NPox 2.0

    • C. 

      Alcon

  • 18. 
    It is a file infecting computer virus and it does not become memory resident. It will only infect one .COM file in any given directory, but will not infect the first one. This means there must be at least two .COM files in the directory for it to spread
    • A. 

      Ambulance

    • B. 

      JoJo

    • C. 

      Violator

  • 19. 
    It was a computer virus authored by Dutch programmer Jan de Wit on Feb 11, 2001.That virus tempts users with the message: "Hi: Check This!", with what appears to be a picture file labelled "AnnaKournikova.jpg.vbs".The worm arrives in an email with the subject line "Here you have, ;0)"
    • A. 

      Anna

    • B. 

      Anna Kournikova

    • C. 

      ANT

  • 20. 
    It is a fairly standard boot virus,  first discovery was at Lenart, Slovenia, which led to its alias of Lenart. It was isolated in Hong Kong several times at the beginning of 1994, but did not become common until it spread to North America in the Spring of 1995
    • A. 

      Anti-D

    • B. 

      Holland Girl

    • C. 

      AntiCMOS

  • 21. 
    You receive this text: "Guess what ??? You have been victimized by a virus!!! Do not try to reboot your computer or even turn it off. You might as well read this and weep!"
    • A. 

      Arcv.965

    • B. 

      Arcv.986

    • C. 

      Arcv.1060

    • D. 

      Arcv.1072

  • 22. 
    You receive this text: "Happy New Year from the ARCV Released 1 June 1992. Made in England by ICE-9"
    • A. 

      Arcv.335

    • B. 

      Arcv.541

    • C. 

      Arcv.639

  • 23. 
    You receive this text: "Yo.. I've Just Found a Virus.. Opps.. Sorry I'm the Virus. Well let me introduce myself.. I am ARCV-3 Virus, by Apache Warrior. Long Live The ARCV and Whats an Hard ECU? Vote Yes to the Best Vote ARCV.."
    • A. 

      Arcv.670

    • B. 

      Arcv.562

    • C. 

      Arcv.651

    • D. 

      Arcv.773

  • 24. 
    Arcv.718 will send you this text:
    • A. 

      So Who's the Best Then? Oh Well Sorry But The ARCV Are The Best! Well Your in Favor with Us then.

    • B. 

      Hello Dr Sol. & Fido. Lurve U lots ICE-9 (c) 1992 ARCV. P.S. Apache sez Hi(Dos)

    • C. 

      Help.. Help.. I'm Sinking........

    • D. 

      Happy Xmas from The ARCV

  • 25. 
    Arcv.1060 will send you:
    • A. 

      Which ARCV Member Likes a Sandwich? Cheese, Beef Spread, Cucumber and Crisp Corned Beef and Salad Cream Jaffa Cake and Hamster on Rye Is it A. Apache Warrior B. ICE-9 C. Slartibartfast Select a Letter: Well you know you're ARCV Members. Bad Luck.. Better Luck Next Time.

    • B. 

      This is the Scythe for Reaper Man. Beware I'm Sharp! Made in England by Apache Warrior, ARCV Pres. Scythe Ver. 1.01 (c) Apache Warrior 92. Reaper Man Swung The SCYTHE and the PC Died!

    • C. 

      Happy Xmas from The ARCV.

    • D. 

      THE TWINS [X-3a] & [X-3b] ARE ON YOUR PC. ICE-9

  • Back to Top Back to top