This is a computer science engineering quiz on cybersecurity, which includes questions on attack vectors in cyber security.
There are _________ types of computer virus.
Which of the following is not a type of virus?
Which of them is not an ideal way of spreading the virus?
In which year Apple II virus came into existence?
In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.
The virus hides itself from getting detected by ______ different ways.
_______________ infects the master boot record and it is challenging and a complex task to remove this virus.
________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.
Direct Action Virus is also known as ___________
______________ infects the executables as well as the boot sectors.
______________ are difficult to identify as they keep on changing their type and signature.
____________ deletes all the files that it infects.
_____________ is also known as cavity virus.
Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
A computer ________ is a malicious code which self-replicates by copying itself to other programs.
Program
Virus
Application
Worm