Consider the following statements. I. Malware is software that performs harmful functions on a Computer. II. Important types of malware include rootkits, viruses, worms, trojan horses, and spyware. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Explanation: This question asks which statements about malware are correct, focusing on its harmful nature and the main types like viruses, worms, trojans, and spyware. Malware refers to software specifically designed to disrupt, damage, or gain unauthorized access to Computer systems. Understanding the categories helps differentiate their behaviors and purposes. By analyzing each statement, one can determine whether it accurately describes malware’s definition and its common forms. Malware operates differently depending on type; for example, viruses replicate, worms spread via networks, and trojans disguise themselves as legitimate software. Recognizing these distinctions ensures clarity in assessing the correctness of each statement. Malware can significantly impact system security, data integrity, and privacy, making knowledge of its types essential for IT awareness. Overall, evaluating the statements requires checking both the general definition of malware and the examples given to confirm accuracy.
Option b - Only II
Consider the following statements. I. A Computer virus is a program that can replicate itself and infect other computers. II. A virus can spread through removable media like USB drives, CDS, or DVDs. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Explanation: This question examines the characteristics and spread of Computer viruses, focusing on self-replication and infection methods like removable media. A virus is a type of malware that can copy itself and spread to other systems, often attaching to files or programs. Spread mechanisms include USB drives, CDS, DVDs, and Network sharing. Analyzing the statements involves verifying if they accurately describe a virus’s ability to replicate and the ways it transmits between computers. Understanding how viruses propagate is key for implementing preventive measures such as antivirus software and safe media handling. The distinction between self-replicating viruses and other malware types clarifies why certain statements are correct. In practice, viruses require a host file or program, unlike worms that spread independently, so identifying these properties is crucial. Evaluating both statements together highlights the virus’s defining traits and common transmission paths, ensuring comprehension of infection risks and security strategies.
Option c - Both I and II
What is malware?
a) Software used to send instant messages about events on Social networks
b) Software designed to enter a Computer system without the owner’s permission
c) Software created to improve the performance of internet-connected systems
d) Both a and b are correct
Explanation: This question asks for the definition of malware, emphasizing its purpose and how it affects Computer systems. Malware is any software designed to enter a system without authorization and perform harmful actions. It can disrupt normal operations, steal information, or gain control over devices. Key types include viruses, worms, trojans, spyware, adware, and rootkits, each operating differently. Evaluating this question requires understanding that malware is not software designed for beneficial purposes but is intended to harm or exploit systems. Recognizing the distinction between general software and malware helps identify threats. Malware can be installed through downloads, infected files, phishing, or Network vulnerabilities, highlighting the importance of prevention strategies. Overall, understanding malware’s definition clarifies why certain options accurately describe its characteristics.
Option b - Software designed to enter a Computer system without the owner’s permission
Which of the following is the most common way malware spreads?
a) USB drives
b) Floppy disks
c) Removable storage devices
d) E-mail
Explanation: This question focuses on how malware is transmitted between computers. Malware can spread through physical media like USB drives, CDS, or floppy disks, but one of the most prevalent methods is via email attachments or links. Users unknowingly executing infected files allow malware to propagate. Understanding the primary spread mechanism helps in designing preventive measures such as safe browsing, email filtering, and antivirus scanning. Analyzing each option requires recognizing both traditional and modern transmission methods. While removable media are valid paths, email is often the fastest and most widespread method for malware distribution. Awareness of these pathways is essential for cybersecurity practices. Overall, the focus is on identifying the method that allows malware to reach the largest number of targets efficiently.
Option d - E-mail
Which malware is used to control multiple infected computers through chat systems or IRC channels?
a) Keyloggers
b) Adware
c) Dialers
d) Botnets
Explanation: This question addresses malware designed for remote control of multiple computers. Such malware allows a single operator to command infected machines collectively, often using chat systems or Internet Relay Chat (IRC) channels as control networks. These infected computers, sometimes called a “botnet,” can perform tasks like sending spam, executing distributed denial-of-service attacks, or stealing data. Evaluating the options involves identifying malware that provides remote administration capabilities rather than those that simply monitor or cause local damage. Understanding this category highlights the difference between malware targeting individual systems and malware used for Network-wide attacks. Recognizing the control mechanism is crucial for security monitoring and mitigation. Overall, the question tests knowledge of malware that enables collective manipulation of multiple devices.
Option d - Botnets
Which malicious program hides itself by modifying the host operating system?
a) Rootkits
b) Spyware
c) Stealware
d) Botnets
Explanation: This question focuses on malware that conceals its presence by altering the operating system’s behavior. Such programs evade detection by antivirus or security software by integrating into system files or processes. Examples include rootkits, which can hide files, processes, and registry entries. Understanding the distinction between malware that simply infects and malware that actively hides is important. Evaluating this question requires recognizing which options modify system internals to remain undetectable. These programs often serve as a gateway for other malware or unauthorized access. Awareness of their characteristics helps in implementing specialized detection tools that can uncover hidden threats. Overall, this question highlights malware that uses stealth to persist on a system.
Option a - Rootkits
Which of the following is incorrectly matched?
a) Trojan horse - Malware that cannot replicate itself
b) Backdoor - Bypasses standard authentication methods
c) Beerware - Software released under a very permissive license
d) None of the above
Explanation: This question examines knowledge of various software categories and their definitions. Options include malware types and software licensing models, each with distinct characteristics. For example, a trojan horse disguises itself as legitimate software, a backdoor bypasses authentication, and Beerware refers to permissive licensing. Evaluating correctness involves matching each description to its proper definition. Identifying mismatched pairs tests understanding of both malicious software behavior and software licensing terms. By carefully analyzing the definitions, one can determine which option does not accurately correspond to the label given. Overall, this question emphasizes accurate identification of software characteristics and correct terminology.
Option d - None of the above
Which of the following correctly describes a Zombie Computer?
a) A large parallel Computer used for weather simulation
b) A grid Computer used for flight training simulations
c) An infected computer used as a proxy to send spam and generate profit
d) None of the above
Explanation: This question focuses on the concept of a Zombie Computer, which is an infected system controlled remotely without the owner’s knowledge. Such computers often serve as proxies to send spam, participate in distributed attacks, or generate profit for cybercriminals. Evaluating the options requires distinguishing between legitimate large-scale computers used for simulations and infected systems used for malicious purposes. Understanding how a computer becomes a “zombie” highlights the importance of malware prevention and Network monitoring. The question tests recognition of infected systems’ operational roles in cybercrime. Overall, it emphasizes the distinction between controlled and legitimate computers in IT contexts.
Option c - An infected computer used as a proxy to send spam and generate profit
What is vishing in modern IT?
a) Using voice Communication to illegally obtain personal or financial information
b) Using VoIP to hack into secure sites
c) Accessing and deleting files from a system without authorization
d) Spreading worms disguised as cookies over the internet
Explanation: This question deals with vishing, a type of Social engineering attack that uses voice Communication to obtain sensitive information like passwords, PINs, or personal data. Vishing typically occurs over telephone calls or VoIP, where attackers impersonate trusted entities. Evaluating the options requires understanding the difference between vishing, phishing, and other hacking techniques. Awareness of vishing helps in recognizing fraudulent calls and implementing countermeasures, such as verification protocols and avoiding sharing sensitive information over phone calls. The question highlights the human factor in cybersecurity threats rather than purely technical malware. Overall, it tests knowledge of voice-based cybercrime techniques and preventive awareness.
Option a - Using voice Communication to illegally obtain personal or financial information
What is a computer firewall?
a) Software or hardware that increases a computer's speed
b) Software or hardware that prevents crashes due to bugs
c) Software or hardware that protects against threats and secures networks
d) All of the above
Explanation: This question examines the purpose of a firewall in IT security. A firewall is software or hardware that monitors and controls incoming and outgoing Network traffic based on security rules. It protects computers and networks from unauthorized access, attacks, and malicious traffic. Evaluating the options involves distinguishing between performance tools and security tools. Firewalls can be implemented as standalone devices, integrated into routers, or as software applications on individual systems. They form the first line of defense in cybersecurity, blocking suspicious traffic while allowing legitimate communications. Overall, the question focuses on understanding the firewall’s role in protecting networks and systems.
Option c - Software or hardware that protects against threats and secures networks
Consider the following statements about digital signatures. I. It is an electronic record identifying the certifying authority. II. It serves as proof of identity for accessing information or services online. III. It ensures that the signed electronic document has not been altered. Which of the statements above is/are correct?
a) Only I
b) II and III
c) Only III
d) I, II, and III
Explanation: This question deals with digital signatures, which provide authenticity, integrity, and non-repudiation for electronic documents. Digital signatures verify the signer’s identity through a certifying authority and ensure that content has not been tampered with. Evaluating the statements requires understanding that digital signatures link identity verification with document integrity. They are commonly used in online transactions, legal documents, and secure communications. Recognizing the functions—identity proof, certifying authority involvement, and integrity assurance—helps in assessing the correctness of each statement. Overall, the question tests knowledge of how digital signatures secure and validate electronic information.
Option d - I, II, and III
Consider the following software: I. NAYAN II. USB Pratirodh III. Malware Resist. Which of the above were developed by C-DAC to protect Bengaluru from cyber-attacks?
a) I, II, and III
b) I and III
c) II and III
d) Only III
Explanation: This question focuses on cybersecurity initiatives by C-DAC in Bengaluru. These software solutions were designed to prevent cyber-attacks and enhance digital security in local networks and systems. Evaluating the options requires understanding the specific purposes of each program: some target malware prevention, others control USB access, or monitor cyber threats. Recognizing which software is actively implemented by C-DAC ensures clarity in distinguishing locally developed security solutions from general-purpose tools. Understanding their objectives and deployment helps in assessing how cities and organizations protect digital infrastructure. Overall, the question tests knowledge of national cybersecurity measures and locally developed protective software.
Option a - I, II, and III
Consider the following pairs: I. Belle II - Artificial Intelligence experiment II. Blockchain Technology - Digital cryptocurrency III. CRISPR-Cas9 - Particle Physics. Which pair(s) are correctly matched?
a) I and III
b) Only II
c) II and III
d) I, II, and III
Explanation: This question tests knowledge of Technology and science concepts. Each pair combines a concept with its field or application. Evaluating the statements involves verifying whether Belle II is indeed related to AI, Blockchain is associated with cryptocurrencies, and CRISPR-Cas9 is connected to particle Physics. Understanding the correct domains ensures the ability to identify mismatched scientific and technological terms. Such Questions assess familiarity with emerging technologies, research projects, and key innovations. Overall, the question highlights accurate mapping between concepts and their real-world applications.
Option b - Only II
A person who uses their skills to gain unauthorized access to computers is called a
a) Spammer
b) Programmer
c) Hacker
d) Instant messenger
Explanation: This question examines the term for someone who illegally accesses computer systems. It focuses on the skillset and intent behind unauthorized access, differentiating ethical programmers or system administrators from individuals exploiting vulnerabilities. Recognizing the role, motivations, and activities of such individuals clarifies cybersecurity risks. Evaluating the options requires identifying the correct term that describes a person who breaches systems for personal or malicious purposes. Awareness of these definitions is crucial for understanding cyber threats and preventive strategies. Overall, the question tests knowledge of terminology related to unauthorized computer access.
Option c - Hacker
Which application captures Network data packets, including passwords and other transmitted information?
a) Rootkits
b) Stuxnet
c) Spoofing attack
d) Packet sniffer
Explanation: This question focuses on Network monitoring tools used to analyze transmitted data. Packet capture applications record data packets passing through a Network, which may include sensitive information like passwords if not encrypted. Understanding how these tools operate helps distinguish them from malware or other attacks. Evaluating the options involves identifying software designed specifically for packet inspection and Network analysis, often used in cybersecurity testing or by attackers for information theft. Awareness of packet capture mechanisms is critical for Network security and detecting potential breaches. Overall, the question tests understanding of tools used to monitor and intercept network communications.
Option d - Packet sniffer
Which program appears to perform one function but secretly creates a backdoor for future access?
a) Keystroke logger
b) Phishing program
c) Trojan horse
d) Spam ping
Explanation: This question examines malware that disguises itself as legitimate software while secretly allowing unauthorized access. Such programs, commonly called trojans, trick users into installation while creating backdoors for hackers. Evaluating the options requires understanding how malware can combine legitimate appearances with hidden malicious capabilities. Recognizing this behavior is essential for cybersecurity awareness, as it highlights the risks of executing unknown or unverified software. Overall, the question tests knowledge of malware that employs deception to compromise system security.
Option c - Trojan horse
Which malware does not belong to the 'Greyware' category?
a) Adware
b) Spyware
c) Joke program
d) Trojan horse
Explanation: This question focuses on classifying types of malware based on risk level. Greyware includes software that is not strictly harmful but can be annoying or intrusive, like adware, spyware, or joke programs. Evaluating the options requires distinguishing software that is clearly malicious or outside this borderline category. Understanding malware classification helps in implementing proper defensive measures and recognizing the relative threat posed by different software types. Overall, the question tests knowledge of malware taxonomy and category distinctions.
Option c - Trojan horse
Consider the following statements about Beerware. I. Beerware allows the user to use or modify the source code freely. II. The term Beerware was coined by John Brixton. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Explanation: This question examines Beerware, a software licensing model. Beerware is permissive, allowing users to freely use, modify, and redistribute source code, often with a humorous request for a “beer” in return. Evaluating the statements requires identifying the licensing freedoms and acknowledging the origin of the term. Understanding these attributes helps distinguish Beerware from other licensing types and highlights the informal nature of some open-source software licenses. Overall, the question tests knowledge of permissive software licensing models and their characteristics.
Option c - Both I and II
Consider the following statements about computer worms. I. Worms can use networks to copy themselves to other computers without user intervention. II. Like viruses, worms must attach to existing programs. Which of the statements above is/are correct?
a) Only I
b) Only II
c) Both I and II
d) Neither I nor II
Explanation: This question examines computer worms, a type of malware that self-replicates across networks. Unlike viruses, worms do not require host programs to propagate and can independently exploit vulnerabilities. Evaluating the statements requires understanding this fundamental difference between worms and viruses. Recognizing the autonomous nature of worms clarifies their rapid spread potential and the risks they pose to networks. This distinction is critical for designing appropriate detection and mitigation strategies. Overall, the question tests understanding of worm characteristics and their operational differences from viruses.
Option a - Only I
Which software runs automated tasks on the internet?
a) Spam indexing
b) Spam bot
c) Web bot
d) Vishing
Explanation: This question focuses on software designed to perform automated internet tasks, such as data collection, monitoring, or interactions with websites. Web bots or spam bots execute repetitive actions without manual intervention. Evaluating the options requires distinguishing automated task software from manual or malicious applications. Awareness of their functionality helps in understanding both legitimate uses, like search engine indexing, and potential misuse in spam or cyber-attacks. Overall, the question tests knowledge of automation tools and their roles in online activities.
Option c - Web bot
We covered all the internet mcq in hindi above in this post for free so that you can practice well for the exam.
My name is Vamshi Krishna and I am from Kamareddy, a district in Telangana. I am a graduate and by profession, I am an android app developer and also interested in blogging.