Malware MCQ Questions
This section focuses on "Malware" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. Which of the following are objectives of Malware?
A. Provide remote control for an attacker to use an infected machine.
B. Investigate the infected user’s local network.
C. Steal sensitive data.
D. All of the above
View Answer
Ans : D
Explanation: Though varied in type and capabilities, malware usually has one of the following objectives: Provide remote control for an attacker to use an infected machine, Send spam from the infected machine to unsuspecting targets, Investigate the infected user’s local network and Steal sensitive data.
2. Malware is short form of ?
A. malicious hardware
B. malicious software
C. Both A and B
D. None of the above
View Answer
Ans : B
Explanation: Malware is short form of malicious software
3. Which of the following is a programs that copy themselves throughout a computer or network?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
View Answer
Ans : C
Explanation: Viruses : Programs that copy themselves throughout a computer or network.
4. Which is true about Worms ?
A. Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
B. Worms on existing programs and can only be activated when a user opens the program.
C. Worms vary and hide themselves in the operating system.
D. All of the above
View Answer
Ans : A
Explanation: Worms : Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
5. Which of the following malware do not replicate or reproduce through infection?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
View Answer
Ans : B
Explanation: Trojans do not replicate or reproduce through infection. “Trojan” alludes to the mythological story of Greek soldiers hidden inside a wooden horse that was given to the enemy city of Troy.
6. RATs stands for?
A. Rootkits Administration Tools
B. Remote Access Tools
C. Remote Administration Tools
D. Remote Attack Tools
View Answer
Ans : C
Explanation: Remote Administration Tools (RATs) : Software that allows a remote operator to control a system.
7. Which malware has Short for "robot network"?
A. ronets
B. botnets
C. botwork
D. rowork
View Answer
Ans : B
Explanation: Botnets are highly versatile and adaptable, able to maintain resilience through redundant servers and by using infected computers to relay traffic.
8. Which malware enable administrative control, allowing an attacker to do almost anything on an infected computer?
A. Rootkits
B. RATs
C. Botnets
D. Worms
View Answer
Ans : B
Explanation: RATs enable administrative control, allowing an attacker to do almost anything on an infected computer.
9. Which malware are often the armies behind today's distributed denial-of-service (DDoS) attacks?
A. Botnets
B. botnetsSpyware
C. Trojans
D. Viruses
View Answer
Ans : A
Explanation: Botnets are often the armies behind today's distributed denial-of-service (DDoS) attacks.
10. What is true regarding Trojans?
A. Trojans will conduct whatever action they have been programmed to carry out
B. "Trojan" alludes to the mythological story of Greek soldiers hidden inside a wooden horse that was given to the enemy city of Troy.
C. Trojans do not replicate or reproduce through infection.
D. All of the above
View Answer
Ans : D
Explanation: All of the above statement are true.
Discussion