0% found this document useful (0 votes)
16 views5 pages

Malware Questions

The document contains a series of multiple-choice, true/false, and fill-in-the-blank questions related to malware, specifically focusing on characteristics and differences between various types such as viruses, Trojans, adware, and spyware. Key points include that viruses replicate and infect files, Trojans disguise themselves as legitimate software, and adware is used for displaying advertisements. Additionally, it highlights that Trojans require user interaction to infect systems and that adware can pose privacy risks despite being commonly bundled with free software.

Uploaded by

anu.roushini28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views5 pages

Malware Questions

The document contains a series of multiple-choice, true/false, and fill-in-the-blank questions related to malware, specifically focusing on characteristics and differences between various types such as viruses, Trojans, adware, and spyware. Key points include that viruses replicate and infect files, Trojans disguise themselves as legitimate software, and adware is used for displaying advertisements. Additionally, it highlights that Trojans require user interaction to infect systems and that adware can pose privacy risks despite being commonly bundled with free software.

Uploaded by

anu.roushini28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Malware questions

1. Multiple-Choice Questions
1. Which of the following is a characteristic of a computer virus?
a) It spreads without user interaction
b) It replicates itself and infects other files
c) It operates as a standalone program
d) It cannot be detected by antivirus software
Answer: b) It replicates itself and infects other files

2. What is the primary purpose of a Trojan horse in malware?


a) To steal sensitive information
b) To display unwanted advertisements
c) To infect other executable files
d) To disrupt the boot process
Answer: a) To steal sensitive information
3. Which of the following types of malware is specifically designed to
show unwanted advertisements?
a) Virus
b) Worm
c) Adware
d) Trojan
Answer: c) Adware

4. What makes a Trojan different from a virus?


a) Trojans replicate themselves, while viruses do not
b) Trojans disguise themselves as legitimate software
c) Trojans spread automatically across networks
d) Trojans require a host file to spread
Answer: b) Trojans disguise themselves as legitimate software

5. Which of the following is NOT an example of adware?


a) Software displaying pop-up ads
b) Software collecting data to show targeted ads
c) A program infecting files to replicate itself
d) A browser toolbar showing sponsored links
Answer: c) A program infecting files to replicate itself

6. What does a Trojan horse malware require to infect a system?


a) A network connection
b) User interaction, such as downloading or running it
c) A specific operating system vulnerability
d) Automatic spreading mechanisms
Answer: b) User interaction, such as downloading or running it

7. Which of the following is a common way for adware to enter a


system?
a) Through email attachments
b) By exploiting unpatched system vulnerabilities
c) Bundled with free software downloads
d) Spread via network worms
Answer: c) Bundled with free software downloads

8. What is the primary difference between adware and spyware?


a) Adware is designed to harm the system, while spyware is not
b) Spyware collects information silently, while adware displays ads
c) Spyware infects executable files, while adware does not
d) Adware spreads automatically, while spyware requires user interaction
Answer: b) Spyware collects information silently, while adware displays ads

9. Which of the following is a sign of adware infection?


a) Files on your computer become corrupted
b) Your computer shows frequent pop-up ads
c) Your computer slows down due to large email attachments
d) System crashes and frequent reboots
Answer: b) Your computer shows frequent pop-up ads

10.Which of these statements about malware is TRUE?


a) All malware requires user action to spread
b) Viruses can spread without infecting files
c) Trojans are primarily designed to steal data or create backdoors
d) Adware operates only in offline environments
Answer: c) Trojans are primarily designed to steal data or create backdoors

2. True or False Questions


1. A Trojan horse can replicate itself like a virus.
Answer: False
2. Adware is typically bundled with free software and used for
displaying advertisements.
Answer: True
3. A virus can only infect files when it is executed by the user.
Answer: True
4. Adware is harmless and does not pose any privacy risks.
Answer: False
3. Fill-in-the-Blank Questions
1. A _______ is a type of malware that disguises itself as legitimate
software.
Answer: Trojan
2. Malware designed to replicate and spread by infecting other files
is called a _______.
Answer: Virus
3. Software that displays unwanted advertisements is known as
_______.
Answer: Adware
4. Trojans often create a _______ to allow hackers unauthorized access
to the system.
Answer: Backdoor
5. Adware is commonly distributed through _______ software
installations.
Answer: Free (or bundled)

You might also like