Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What Is Anti-spyware Program?what Is Anti-spam Program?

Answer»

Anti-Spyware Program :  Anti-spyware program is a type of program DESIGNED to prevent and detect unwanted spyware program INSTALLATIONS and to remove those programs if installed.

Examples of Anti-spyware program:

  • Spyware Doctor.
  • AVG Anti-spyware.
  • STOPzilla.
  • Spysweeper.

Anti-Spam Program :  Anti-spam software tries to identify useless or DANGEROUS messages for you.

Anti-Spyware Program :  Anti-spyware program is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.

Examples of Anti-spyware program:

Anti-Spam Program :  Anti-spam software tries to identify useless or dangerous messages for you.

2.

What Is Antivirus Program? Give Few Examples?

Answer»

Antivirus Program :

  • “Antivirus" is protective software designed to defend your computer against MALICIOUS software.
  • In order to be an effective defense, the antivirus software needs to RUN in the background at all TIMES, and should be kept updated so it recognizes new versions of malicious software.

Examples of Antivirus Program :

  • NORTON Antivirus.
  • AVG.
  • Kaspersky.
  • Avast.
  • PC-Cilin.
  • McAffee.
  • Avira.

Antivirus Program :

Examples of Antivirus Program :

3.

What Is Anti-malware Program?

Answer»

Anti-MALWARE Program : Anti-Malware program is used to PREVENT, detect, and remove COMPUTER viruses, worms, trojan horses and any other TYPE of malware.

Examples of Anti-Malware program:

  • ANTIVIRUS program.
  • Anti-spyware program.
  • Anti-spam program.
  • Firewall.

Anti-Malware Program : Anti-Malware program is used to prevent, detect, and remove computer viruses, worms, trojan horses and any other type of malware.

Examples of Anti-Malware program:

4.

What Are The Symptoms?

Answer»

Symptoms :

  • INCREASED CPU usage.
  • Slow computer or web browser SPEEDS.
  • Problems connecting to networks.
  • Freezing or crashing.
  • Modified or deleted files.
  • APPEARANCE of strange files, programs, or desktop icons
  • Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs) Strange computer behavior Emails/messages being sent automatically and without USER’s KNOWLEDGE (a friend receives a strange email from you that you did not send).
  • There seems to be a lot of network activity when you are not using the network.
  • The available memory on your computer is lower than it should be.
  • Programs or files appear or disappear without your knowledge.
  • File names are changed.

Symptoms :

5.

How Can You Protect Your Computer?

Answer»
  • Install protection SOFTWARE.
  • PRACTICE CAUTION when working with files from unknown or questionable SOURCES.
  • Do not open e-mail if you do not recognize the sender.
  • Download files only from reputable INTERNET sites.
  • Install firewall.
  • Scan your hard drive for viruses monthly.

6.

What Are The Damages Of Malware?

Answer»

Damages of Malware 

Data LOSSMany viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files. 

Account Theft : Many TYPES of malware include keylogger functions, designed to steal accounts and passwords from their targets. This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks. 

Botnets : Many types of malware also subvert CONTROL over the user's computer, turning it into a "bot" or "zombie." Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails. 

Financial Losses : If a hacker GAINS access to a CREDIT card or bank account via a keylogger, he can then use that information to run up charges or drain the account. Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack.

Damages of Malware 

Data Loss : Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if you catch the infection early, you may have to delete infected files. 

Account Theft : Many types of malware include keylogger functions, designed to steal accounts and passwords from their targets. This can give the malware author access to any of the user's online accounts, including email servers from which the hacker can launch new attacks. 

Botnets : Many types of malware also subvert control over the user's computer, turning it into a "bot" or "zombie." Hackers build networks of these commandeered computers, using their combined processing power for tasks like cracking password files or sending out bulk emails. 

Financial Losses : If a hacker gains access to a credit card or bank account via a keylogger, he can then use that information to run up charges or drain the account. Given the popularity of online banking and bill payment services, a hacker who manages to secrete a keylogger on a user's system for a full month may gain access to the user's entire financial portfolio, allowing him to do as much damage as possible in a single attack.

7.

How Malware Spreads?

Answer»

Malware is a program that must be triggered or somehow executed before it can infect your COMPUTER system and spread to others.

Here are some examples on how malware is distributed:

  1. SOCIAL network.
  2. Pirated SOFTWARE.
  3. Removable MEDIA.
  4. Emails.
  5. Websites.

Malware is a program that must be triggered or somehow executed before it can infect your computer system and spread to others.

Here are some examples on how malware is distributed:

8.

What Is Ransomware?

Answer»

Ransomware :

  • Ransomware is a FORM of malware that essentially holds a COMPUTER system captive while demanding a ransom.
  • The malware restricts USER access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer.

Ransomware :

9.

What Is Zombie?

Answer»

Zombie :  Zombie PROGRAMS take CONTROL of your COMPUTER and USE it and its Internet connection to attack other computers or networks or to PERFORM other criminal activities.

Zombie :  Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities.

10.

What Are Worms?

Answer»

Worms

  • A computer worm is a self-replicating computer program.
  • It uses a network to send COPIES of itself to other nodes (computers on the network) and it may do so WITHOUT any USER INTERVENTION.
  • It does not need to attach itself to an EXISTING program.

Worms

11.

What Is Trojan Horse?give Few Examples?

Answer»

Trojan Horse

  • A Trojan Horse program has the APPEARANCE of having a useful and desired FUNCTION.
  • A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer.
  • A Trojan Horse must be sent by someone or carried by ANOTHER program and may arrive in the form of a joke program or software of some sort.
  • These are often used to capture your logins and passwords.

Example of Trojan Horses :

  • Remote access TROJANS (RATs)
  • Backdoor Trojans (backdoors)
  • IRC Trojans (IRCbots)
  • Keylogging Trojans

Trojan Horse

Example of Trojan Horses :

12.

Give Few Examples Of Viruses?

Answer»

Examples of COMPUTER viruses are:

  • Macro virus.
  • Boot virus.
  • Logic BOMB virus.
  • Directory virus.
  • RESIDENT virus.

Examples of computer viruses are:

13.

What Is A Virus?

Answer»

Viruses :

  • A program or piece of code that is loaded ONTO your computer without your knowledge and runs against your wishes.
  • Viruses can also replicate themselves.
  • All computer viruses are manmade.
  • Viruses COPY themselves to other disks to spread to other COMPUTERS.
  • They can be merely ANNOYING or they can be VASTLY destructive to your files.

 

Viruses :

 

14.

What Are The Types Of Malware?

Answer»

Types of Malware :

Types of Malware :

15.

What Are The Uses Of Usage Of Malware?

Answer»

USAGE of Malware :

  • MANY early infectious programs, including the first Internet Worm, were written as experiments or pranks.
  • Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others.
  • • Malware is sometimes used broadly against government or corporate websites to gather GUARDED information, or to disrupt their operation in general.
  • HOWEVER, malware is often used against individuals to gain personal information such as social security NUMBERS, bank or credit card numbers, and so on.

Usage of Malware :

16.

What Is Meant By Malware?

Answer»
  • A is SOFTWARE used or CREATED to disrupt computer operation, gather sensitive information, or GAIN access to PRIVATE computer systems.
  • It can appear in the form of code, scripts, active content, and other software.
  • Malware' is a general term used to refer to a variety of FORMS of hostile, intrusive, or annoying software

17.

What Is The Malware?

Answer»

SHORT for MALICIOUS SOFTWARE.

Short for malicious software.