Copyright

Understanding & Preventing Computer Viruses Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Malware is used to describe all types of bad software. Malware is a combination of what two words?

Question 2 2. _____ is a type of malware that may cause pop-up advertisements to appear outside the web browser.

Question 3 3. What type of malware takes over your web browser to change settings, such as your homepage or preferred search engine?

Question 4 4. Malware that is used to steal your information and send it to a third party is known as _____

Question 5 5. A _____ replicates itself and is capable of moving between systems without human intervention.

Page 2

Question 6 6. Which option below is a good way to limit the likelihood of a Trojan horse attack?

Question 7 7. One way to avoid infecting a computer with a Trojan horse is identified by which option?

Question 8 8. Which option below contains a key word or words used to describe a primary characteristic of a Trojan horse?

Question 9 9. Which option below identifies the most likely to experience a Trojan horse attack?

Question 10 10. Which option below best describes the primary intent of a Trojan horse?

Page 3

Question 11 11. Asymptomatic means a virus _____

Question 12 12. Which of the following is NOT a way to protect your computer from a virus?

Question 13 13. What is scareware?

Question 14 14. Trojan viruses are downloaders that:

Question 15 15. Which virus groups computers together to create a network?

Page 4

Question 16 16. What is one of the differences between a virus and a worm?

Question 17 17. Which of these is not an example of an antivirus solution?

Question 18 18. Which of the following makes a virus different from a worm?

Question 19 19. What is the best way to remove a worm virus?

Question 20 20. Which of these is not an example of a famous worm virus?

Page 5

Question 21 21. The first computer virus developed was the _____.

Question 22 22. The Love Letter virus was characterized by _____.

Question 23 23. The beginning of computer viruses stemmed from _____.

Question 24 24. The Brain Boot virus is so called because it affects the _____ of the host device.

Question 25 25. What is a computer virus?

Understanding & Preventing Computer Viruses Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support