MCQ of Computer Security with answer set – 2

1. …………….. are used in denial of service attacks, typically
against targeted web sites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse
2. Select the correct order for the different phases of
virus execution.
i) Propagation phase                      ii)
Dormant phase
iii) Execution phase                         iv)
Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i

3. A ………………… attaches itself to executable files and
replicates, when the infected program is executed, by finding other executable
files to infect.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
4. …………………….. is a form of virus explicitly designed to hide
itself from detection by antivirus software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
5. A …………………….. creates copies during replication that are
functionally equivalent but have distinctly different bit patterns.
A) Boot Sector Virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus
6. A portion of the Polymorphic virus, generally called a
…………………….. , creates, a random encryption, key to encrypt the remainder of the
virus.
A) mutual engine
B) mutation engine       
C) multiple engine
D) polymorphic engine
7. State whether the following statement is true.
i) A macro virus is platform independent.
ii) Macro viruses infect documents, not executable portions
of code.
A) i-only
B) ii-only
C) Both i and ii
D) Non i and ii
8. The type(s) of auto executing macros, in Microsoft word
is/are
A) Auto execute
B) Auto macro
C) Command macro
D) All of the above
9. In …………….., the virus places an identical copy of itself
into other programs or into certain system areas on the disk.
A) Dormant phase
B) Propagation phase
C) Triggering phase
D) Execution phase
10. A ……………… is a program that secretly takes over another
Internet-attached computer and then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors
Answers:
1.
B) Zombie
2.
C) ii, i, iv an iii
3.
C) Parasitic Virus
4.
A) Stealth virus
5.
B) Polymorphic Virus
6.
B) mutation engine
7.
C) Both i and ii
8.
D) All of the above
9.
B) Propagation phase
10.
B) Zombie
 

About shuseel

Shuseel Baral is a web programmer and the founder of InfoTechSite has over 5 years of experience in software development, internet, SEO, blogging and marketing digital products and services is passionate about exceeding your expectations.