All Exams  >   Bank Exams  >   Computer Awareness for Competitive Exams  >   All Questions

All questions of Computer Security for Bank Exams Exam

The first PC virus was developed in _______.
  • a)
    1982
  • b)
    1984
  • c)
    1985
  • d)
    1971
  • e)
    1988
Correct answer is option 'D'. Can you explain this answer?

Kabir Verma answered
In 1986, the 5.2" floppy discs were first infected by Brain, the first computer virus. According to Secure list, two brothers who owned a computer store in Pakistan, Basit and Amjad Farooq Alvi, were responsible.

Which of the following computer viruses hijack the system when it boots and deletes data?
  • a)
    Trojan
  • b)
    System infectors
  • c)
    Stealth virus
  • d)
    Boot infectors
  • e)
    None of the above
Correct answer is option 'C'. Can you explain this answer?

Stealth viruses are computer viruses that are specifically designed to hide their presence on an infected system. They are known for their ability to camouflage themselves and avoid detection by antivirus software. These viruses often infect the boot sector of a computer's hard drive, which allows them to take control of the system as soon as it boots up.

Here is a detailed explanation of each of the given options:

a) Trojan: Trojans are a type of malicious software that disguise themselves as legitimate programs or files. Unlike stealth viruses, Trojans do not typically infect the boot sector or delete data upon system boot. Instead, they often perform actions such as stealing personal information, installing additional malware, or providing unauthorized access to the infected computer.

b) System infectors: System infectors are viruses that infect executable files on a system, including both program files and system files. While these viruses can cause damage to the infected files, they do not necessarily hijack the system upon booting or delete data.

c) Stealth virus: As mentioned earlier, stealth viruses are designed to hide their presence on an infected system. They often infect the boot sector of a computer's hard drive, allowing them to gain control of the system as soon as it boots up. Some stealth viruses may also delete or corrupt data on the system, depending on their specific payload.

d) Boot infectors: Boot infectors, also known as boot sector viruses, infect the boot sector of a computer's hard drive or other bootable media. These viruses alter the boot process, allowing them to execute their code before the operating system loads. While boot infectors can cause various types of damage, including data deletion, not all boot infectors necessarily delete data.

Therefore, the correct answer to the question is option 'C' - Stealth virus. Stealth viruses are designed to hijack the system upon booting and have the capability to delete data.

Junk E-mail is also called as __________.
  • a)
    Spool
  • b)
    Spoof
  • c)
    Spam
  • d)
    Hack
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Nikita Singh answered
Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

Software with malicious content, such as viruses, worms and trojan horses, is referred to as _______.
  • a)
    Trojan
  • b)
    Malware
  • c)
    Firewall
  • d)
    Scareware
  • e)
    Spyware
Correct answer is option 'B'. Can you explain this answer?

Rohan Sengupta answered
The term "malware" refers to a variety of malicious software versions, such as viruses, ransomware, and spyware. Malware, a shorthand for malicious software, is often composed of code created by cyber attackers to seriously harm systems and data or gain unauthorized access to a network.

You ought to install __________ on your computer to protect it from viruses.
  • a)
    Disk Cleanup
  • b)
    Backup Wizard
  • c)
    Antivirus Software
  • d)
    Disk Defragmenter
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Kabir Verma answered
Installing antivirus software, such as Bitdefender, Norton, or Kaspersky, is the best approach to protect against malware. Malware may be stopped from being installed by antivirus software and it can also be removed from your computer.

VIRUS stands for ________.
  • a)
    Vital Information Resources Under Siege
  • b)
    Viral Important Record User Searched
  • c)
    Very Interchanged Result Until Source
  • d)
    Very Intelligent Resources Under Search
  • e)
    None of the above
Correct answer is option 'A'. Can you explain this answer?

Kabir Verma answered
Vital Information Recourse Under Siege is referred to as VIRUS. A computer virus is essentially harmful software, sometimes known as "malware," which multiplies itself after infecting your system by altering other software and adding its code.

Chapter doubts & questions for Computer Security - Computer Awareness for Competitive Exams 2025 is part of Bank Exams exam preparation. The chapters have been prepared according to the Bank Exams exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Bank Exams 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Computer Security - Computer Awareness for Competitive Exams in English & Hindi are available as part of Bank Exams exam. Download more important topics, notes, lectures and mock test series for Bank Exams Exam by signing up for free.

Top Courses Bank Exams