MEDIUM
Earn 100

Which of the following is not a malware?

16.67% studentsanswered this correctly

Important Questions on Computer and Internet Basics

EASY
Which of the following protects the computer from the hackers?
MEDIUM

Which one of the following is a computer virus?

EASY
_____are often delivered to a PC through an email attachment and are often designed to do harm.
MEDIUM
Which type of malware is a program or piece of code that is loaded onto a person's computer without his knowledge and runs against his wishes?
EASY
Verification of login name and password is known as:
MEDIUM
Single-word reference to viruses, worms etc., is called:
EASY
_____ is a program or set of program that are designed to detect and destroy computer viruses.
EASY

In India, under cyber insurance for individuals, which of the following benefits are generally covered, in addition to payment for the loss of funds and other benefits ?

1. Cost of restoration of the computer system in case of malware disrupting access to one's computer

2. Cost of a new computer if some miscreant wilfully damages it, if proved so

3. Cost of hiring a specialized consultant to minimize the loss in case of cyber extortion

4. Cost of defence in the Court of Law if any third party files a suit.

Select the correct answer using the code given below:

MEDIUM
Which one of the following is the malicious program that allows the concealment of that program by modifying the host's operating system so that the malware is hidden from the user?
EASY
_____ is the industry standard name for the first computer virus for MS-DOS. 
EASY

The malware which mutates with every infection and also rewrite itself completely at each iteration are:

EASY

Match the Column I and Column II.

Column I Column II
A. Firewall 1. Guard the data.
B. Data security. 2. Detect and delete harmful spyware.
C. Antispyware 3. Guard the network.
D. Multimedia 4. Consist of text, graphic images and animation.

Codes

MEDIUM
Which of the following is a factor in cyberspace that provides the offenders the choice to commit cyber crime?
MEDIUM
When you will visit websites, spyware may be substantially downloaded. This is called a _____.
HARD

Match the following.

Match I Match II
A Virus I. They are hard to detect
B. Worms II. It is copied itself
C. Trojan Ill. Non-self replicating type of malware

Which of the following is the correct for matching?

MEDIUM
Which malware was used by hackers to manipulate ATM machines and subsequently empty them?