Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

251.

____________ works in background and steals sensitive data.(a) Virus(b) Shareware(c) Trojan(d) AdwareI had been asked this question during an interview.The question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (c) Trojan

Best explanation: Trojans are malicious FILES designed to work HIDDEN on the infected system. They are intended to infect the system by MISLEADING the user. It works in the background and STEALS sensitive INFORMATION about the target user.

252.

Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?(a) Research purpose(b) Pranks(c) Identity theft(d) ProtectionThe question was posed to me during an interview.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (d) Protection

To elaborate: Computer virus is not CREATED for protection. Virus WRITERS may have other reasons like for research purpose, pranks, VANDALISM, FINANCIAL gain, identity theft, and some other malicious PURPOSES.

253.

______________ are difficult to identify as they keep on changing their type and signature.(a) Non-resident virus(b) Boot Sector Virus(c) Polymorphic Virus(d) Multipartite VirusI have been asked this question in examination.My enquiry is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (c) Polymorphic Virus

Best explanation: Polymorphic Virus is difficult to IDENTIFY as they keep on CHANGING their TYPE and SIGNATURE. They’re not easily detectable by traditional antivirus. It usually changes the signature PATTERN whenever it replicates itself.

254.

_____________ is also known as cavity virus.(a) Non-resident virus(b) Overwrite Virus(c) Polymorphic Virus(d) Space-filler VirusThis question was addressed to me in my homework.My question is taken from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (d) Space-filler Virus

The explanation is: Space-fillers are a SPECIAL type of virus which usually does not CAUSE any serious harm to the system EXCEPT it FILLS up the empty space in memory and codes LEADING to wastage of memory.

255.

____________ deletes all the files that it infects.(a) Non-resident virus(b) Overwrite Virus(c) Polymorphic Virus(d) Multipartite VirusI had been asked this question in class test.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) Overwrite Virus

The best I can EXPLAIN: Overwrite virus deletes all files that it infects. It can be REMOVED by only DELETING those infected files. MOSTLY, it gets spread via emails.

256.

______________ infects the executables as well as the boot sectors.(a) Non-resident virus(b) Boot Sector Virus(c) Polymorphic Virus(d) Multipartite VirusI have been asked this question in class test.The origin of the question is Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (d) MULTIPARTITE VIRUS

The EXPLANATION is: Multipartite Virus INFECTS the executables as well as the boot sectors. It infects the computer or get into any system through multiple mediums and are hard to remove.

257.

Direct Action Virus is also known as ___________(a) Non-resident virus(b) Boot Sector Virus(c) Polymorphic Virus(d) Multipartite VirusI got this question during an interview.I want to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right option is (a) Non-resident virus

For explanation I would say: DIRECT Action Virus is also known as a non-resident virus which gets installed & STAYS hidden in your computer’s MEMORY. Such TYPE of virus stays involved to the SPECIFIC type of files which it infects.

258.

________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.(a) Boot Sector Virus(b) Direct Action Virus(c) Polymorphic Virus(d) Multipartite VirusThis question was addressed to me in semester exam.Enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) Direct Action Virus

For EXPLANATION I would say: Direct Action Virus GETS installed & STAYS hidden in your COMPUTER’s memory. Such type of virus stays involved to the specific type of files which it infects.

259.

_______________ infects the master boot record and it is challenging and a complex task to remove this virus.(a) Boot Sector Virus(b) Polymorphic(c) Multipartite(d) TrojansThis question was addressed to me during an internship interview.The above asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (a) Boot SECTOR Virus

The EXPLANATION: Boot Sector Virus INFECTS the MASTER boot record & it is a challenging & a complex task to remove such virus. Mostly such virus spreads through removable devices.

260.

The virus hides itself from getting detected by ______ different ways.(a) 2(b) 3(c) 4(d) 5I had been asked this question during an interview.I need to ask this question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Correct OPTION is (B) 3

To explain I would say: The virus HIDES itself from GETTING DETECTED in three different ways. These are by encrypting itself, by altering the disk directory with additional virus bytes or it uses stealth algorithm to redirect disk data.

261.

In mid-1981, the 1^st virus for Apple computers with the name _________ came into existence.(a) Apple I(b) Apple II(c) Apple III(d) Apple VirusThe question was asked by my college director while I was bunking the class.The question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right CHOICE is (B) Apple II

To explain I would say: In mid-1981, the 1^st virus for Apple computers with the name Apple II came into EXISTENCE. It was ALSO CALLED Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk.

262.

In which year Apple II virus came into existence?(a) 1979(b) 1980(c) 1981(d) 1982I got this question by my college director while I was bunking the class.I want to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (c) 1981

Explanation: In mid-1981, the 1^st virus for APPLE COMPUTERS with the name Apple II came into existence. It was also called ELK Cloner, which resided in the boot sectors of a 3.3 floppy disk.

263.

Which of them is not an ideal way of spreading the virus?(a) Infected website(b) Emails(c) Official Antivirus CDs(d) USBsThis question was addressed to me during an interview for a job.I would like to ask this question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (c) Official Antivirus CDS

The best explanation: The IDEAL means of SPREADING computer virus are through emails, USB drives that are used portable and injected and ejected in different systems as well as from infected WEBSITES. Antivirus selling VENDORS do not place a virus in their CDs and DVDs.

264.

There are _________ types of computer virus.(a) 5(b) 7(c) 10(d) 12This question was addressed to me by my school teacher while I was bunking the class.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Right option is (c) 10

Explanation: There are a total of 10 types of virus. These are categorized BASED on their working and characteristics. These are SYSTEM or Boot Sector Virus, Direct Action Virus, Resident Virus, Multipartite Virus, POLYMORPHIC Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro Virus, Rootkit virus.

265.

Which of the following is not a type of virus?(a) Boot sector(b) Polymorphic(c) Multipartite(d) TrojansI had been asked this question in an interview.My question is taken from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (d) Trojans

For explanation: Types of viruses are System or Boot Sector Virus, DIRECT Action Virus, RESIDENT Virus, MULTIPARTITE Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro Virus, ROOTKIT virus. Trojan does not COME under types of virus.

266.

A computer ________ is a malicious code which self-replicates by copying itself to other programs.(a) program(b) virus(c) application(d) wormI had been asked this question in examination.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer» RIGHT option is (B) virus

The explanation is: A computer virus is a malicious code which self-replicates by copying itself to other programs. The computer virus GETS spread by itself into other executable code or documents. The intention of creating a virus is to infect vulnerable systems.