InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
____________ works in background and steals sensitive data.(a) Virus(b) Shareware(c) Trojan(d) AdwareI had been asked this question during an interview.The question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (c) Trojan |
|
| 252. |
Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?(a) Research purpose(b) Pranks(c) Identity theft(d) ProtectionThe question was posed to me during an interview.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (d) Protection |
|
| 253. |
______________ are difficult to identify as they keep on changing their type and signature.(a) Non-resident virus(b) Boot Sector Virus(c) Polymorphic Virus(d) Multipartite VirusI have been asked this question in examination.My enquiry is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (c) Polymorphic Virus |
|
| 254. |
_____________ is also known as cavity virus.(a) Non-resident virus(b) Overwrite Virus(c) Polymorphic Virus(d) Space-filler VirusThis question was addressed to me in my homework.My question is taken from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (d) Space-filler Virus |
|
| 255. |
____________ deletes all the files that it infects.(a) Non-resident virus(b) Overwrite Virus(c) Polymorphic Virus(d) Multipartite VirusI had been asked this question in class test.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) Overwrite Virus |
|
| 256. |
______________ infects the executables as well as the boot sectors.(a) Non-resident virus(b) Boot Sector Virus(c) Polymorphic Virus(d) Multipartite VirusI have been asked this question in class test.The origin of the question is Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (d) MULTIPARTITE VIRUS |
|
| 257. |
Direct Action Virus is also known as ___________(a) Non-resident virus(b) Boot Sector Virus(c) Polymorphic Virus(d) Multipartite VirusI got this question during an interview.I want to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (a) Non-resident virus |
|
| 258. |
________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.(a) Boot Sector Virus(b) Direct Action Virus(c) Polymorphic Virus(d) Multipartite VirusThis question was addressed to me in semester exam.Enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) Direct Action Virus |
|
| 259. |
_______________ infects the master boot record and it is challenging and a complex task to remove this virus.(a) Boot Sector Virus(b) Polymorphic(c) Multipartite(d) TrojansThis question was addressed to me during an internship interview.The above asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (a) Boot SECTOR Virus |
|
| 260. |
The virus hides itself from getting detected by ______ different ways.(a) 2(b) 3(c) 4(d) 5I had been asked this question during an interview.I need to ask this question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct OPTION is (B) 3 |
|
| 261. |
In mid-1981, the 1^st virus for Apple computers with the name _________ came into existence.(a) Apple I(b) Apple II(c) Apple III(d) Apple VirusThe question was asked by my college director while I was bunking the class.The question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right CHOICE is (B) Apple II |
|
| 262. |
In which year Apple II virus came into existence?(a) 1979(b) 1980(c) 1981(d) 1982I got this question by my college director while I was bunking the class.I want to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (c) 1981 |
|
| 263. |
Which of them is not an ideal way of spreading the virus?(a) Infected website(b) Emails(c) Official Antivirus CDs(d) USBsThis question was addressed to me during an interview for a job.I would like to ask this question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (c) Official Antivirus CDS |
|
| 264. |
There are _________ types of computer virus.(a) 5(b) 7(c) 10(d) 12This question was addressed to me by my school teacher while I was bunking the class.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (c) 10 |
|
| 265. |
Which of the following is not a type of virus?(a) Boot sector(b) Polymorphic(c) Multipartite(d) TrojansI had been asked this question in an interview.My question is taken from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (d) Trojans |
|
| 266. |
A computer ________ is a malicious code which self-replicates by copying itself to other programs.(a) program(b) virus(c) application(d) wormI had been asked this question in examination.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT option is (B) virus The explanation is: A computer virus is a malicious code which self-replicates by copying itself to other programs. The computer virus GETS spread by itself into other executable code or documents. The intention of creating a virus is to infect vulnerable systems. |
|