SlideShare a Scribd company logo
PREVIOUS YEARS QUESTIONS WITH
ANSWER AND EXPLANATION
Part - 5
vrrgroup.academy@gmail.com
https://www.facebook.com/VRRAcademy
www.youtube/VRR Academy
1
2
VIRUS: Vital Information Resource Under Siege.
• Computer virus is a small software program that spreads
from one computer to another and that interferes with
computer operation.
• A piece of software that infects programs
• modifies them to include a copy of the virus
• replicates and goes on to infect other content
• easily spread through network environments
1. Boot sector infector: Infects a master boot record or boot
record and spreads when a system is booted from the disk
containing the virus (poly boot.B, anti EXE etc.)
2. File infector: Infects files that the operating system considers
to be executable (*.exe, *.com)
3. Macro virus: It infects files that are created using certain
applications or programs that contain macros like .doc, .xls .ppts
etc. (Ex: Melissa)
4. Multipartite virus: Infects files in multiple ways (Ex: Flip)
5. Encrypted virus: A portion of the virus creates a random
encryption key and encrypts the remainder of the virus. 3
4
6. Stealth virus: A form of virus explicitly designed to hide itself
from detection by anti-virus software
7. Polymorphic virus: A virus that mutates with every infection /
goes on to create a large number of copies (Ex: Elkern, Tuareg)
8. Metamorphic virus: A virus that mutates and rewrites itself
completely at each iteration and may change behavior as well
as appearance.
9. Web scripting virus: Many websites execute Complex code in
order to provide interesting content. These websites are
sometimes created with purposely infected code. (Ex: JS.
Fortnight)
10. FAT virus: It is used to store all the information about the
location of files, unusable space etc. (Ex: Link virus)
11. File system virus: It is also called cluster virus or directory virus. It
infects the directory of your computer by changing the path that
indicates the location of a file. (Ex: Dir-2 virus)
12. Overwrite virus : It deletes the information contained in the files
that it infects, rendering them partially or totally useless, once they
have been infected. (Ex: Way, Trj.Reboot, Trivial.88-D etc.)
13. Direct action virus: It comes into action when the files containing
the virus is executed. it infects files in the folder that are specified in
the AUTOEXEC.BAT file path. (Eg. vienna virus)
14. Resident virus : It's fixes themselves into the systems memory and
get activated whenever the operating system runs and infects all the
files that are then opened. It hides in the RAM memory and stays there
even after the malicious code is executed. (E.g., Randex, Meve etc.)
5
 It is a computer program that replicates itself in order to spread to
other computers.
 Worms almost always cause atleast some harm to the network,
even if only by consuming bandwidth, where as virus almost
always corrupt or modify files on a targeted computer.
 worms are hard to detect because they are invisible files.
 Eg: Bagle, I love you, Morris etc.
 e-mail worms spread in macro or script code included in
attachments and instant messenger file transfers
6
 It is a non- self- replicating type of Malware which appears to perform
a desirable function but instead facilitates unauthorised access to the
users computer system.
 Trojans do not attempt to inject themselves into other files like a
computer virus.
 Trojan Horses may Steal information, or harm their host computer
systems.
 Trojan Horse install via online games or internet driven application in
order to reach the target computers.
 It is non-replicating in nature.
 e.g., beast, zeroAccess Rootkit etc.
7
The sources of virus could be:
1. Downloadable programs
2. Cracked software
3. Internet
4. Email attachments
5. Booting from unknown CD / USB Drive
8
EFFECTS OF VIRUS
Depending on the types of virus their effects on the computer are:-
 Destroy all data on your local disk.
 Slow down your computer performance.
 Monitor what are you doing.
 Download illegal files onto your computer without being able to delete
them.
 Generates IP address randomly and sends those IP address automatically.
 Steal confidential information like password, account number, credit card
information by random e-mailing.
 May increase or decrease memory size.
 Display different types of error messages.
 Alter PC settings.
 Cause computer to make strange noises make music, clicking noises or
beeps.
9
 Spyware is program which is installed on a computer system to spy on
the system owner's activity and collects all the information which is
misused afterwards.
 Spyware can transmit personal information to another person's
computer over the internet.
Spyware can harm in many ways like:-
1. Steal your password.
2. Observe your browsing choices.
3. Redirect your web browser to phishing pages.
4. Can alter your computer settings ( web browser, home page settings or
placement of your desktop icon).
e.g., cool web search, FinFisher,
10
SPOOFING
 Spoofing is a technique to access the unauthorised data
without concerning to the authorised user over the network.
11
HACKING
• It is Act of intruding into someone else's computer or network.
• It prevents the authorised users from accessing the resources of the
computer.
• Taking administrative privileges.
PHISHING
 It is an attempt to fraudulently acquire sensitive information such as
passwords, credit cards details, etc by masquerading as a
trustworthy person.
 It is an act of sending unsolicited bulk messages in the form of
emails.
 It is a subset of electronic spam involving nearly identical messages
sent to numerous recipient by emails.
 It is a type of internet fraud that seeks to acquire a user's credential
by deception.
12
 It is an act of sending unsolicited bulk messages in the form of
emails.
 It is a subset of electronic spam involving nearly identical
messages sent to numerous recipient by emails.
13
ROOTKITS
 Rootkit is a set of software tools that enables an unauthorized
user to gain control of a computer system without being
detected.
 Rootkits can change how the operating system functions.
 Rootkits are also difficult to remove, in some cases, require a
complete re-installation of the operating system.
14
LOGIC BOMB
 It is a malicious program intentionally inserted into software system and is
timed to cause harm at certain Point in time but is inactive until that point.
 Unlike virus it does not replicate itself.
15
 Safeguards or solutions to protect computer system from
unauthorised access and threats are:
1. ANTIVIRUS SOFTWARE
 Avast, K7, AVG, Kaspersky, Quick Heal, Norton, Trend
micro, McAfree, Symantec
2. DIGITAL CERTIFICATE
3. DIGITAL SIGNATURE
4. PASSOWRD
5. FIREWALL
16
2. DIGITAL CERTIFICATE
 Digital Certificate is the attachment to an electronic message
used for security purposes.
 The common use of a Digital Certificate is to verify that a user
sending a message is who he or she claims to be.
 Certification Authority (CA)
17
 It is an electronic form of a signature that can be used to authenticate
 the identity of the sender of a message or the signer of a document.
18
 A firewall can either be software based or hardware based
and is used to help in keeping a network secure.
 Its primary objective is to control the incoming and outgoing
network traffic by analyzing the data packets and determining
whether it should be allowed through or not, based on
predetermined rule set.
19
20
The five types of firewall are:
1. Packet filtering firewall
2. Circuit-level gateway
3. Stateful inspection firewall
4. Application-level gateway (aka proxy firewall)
5. Next-generation firewall (NGFW)
Which of the following is the type of software that has self-replicating software that causes
damage to files and system?
a) Viruses
b) Trojan horses
c) Bots
d) Worms
e) Backdoors
Which of the following is a program capable of continually replicating with little or no user
intervention?
a) Virus
b) Trojan horses
c) Rootkit
d) Worms
e) Bots
Which of the following is a software that, once installed on your computer, tracks your
internet browsing habits and sends you popups containing advertisements related to the
sites and topics you’ve visited?
a) Backdoors
b) Adware
c) Malware
d) Bots
e) Spyware
21
Answer: (d)
Answer: (a)
Answer: (b)
What is the software called that’s designed to exploit a computer user and is a broad term
covering computer viruses, worms, Trojan, adware, etc.?
a) Backdoors
b) Key-logger
c) Malware
d) Bots
e) Spyware
What is the software called which when get downloaded on computer scans your hard drive
for personal information and your internet browsing habits?
a) Backdoors
b) Key-logger
c) Malware
d) Antiware
e) Spyware
Which of the following is a type of program that either pretends to have, or is described as
having, a set of useful or desirable features but actually contains damaging code.
a) Trojans
b) Viruses
c) Worm
d) Adware
e) Bots
22
Answer: (c)
Answer: (e)
Answer: (a)
_________ are computer programs that are designed by attackers to gain root or
administrative access to your computer.
a) Backdoors
b) Rootkits
c) Malware
d) Antiware
e) Spyware
The attack that focuses on capturing small packets from the network transmitted by other
computers and reading the data content in search of any type of information is ____
a) Phishing
b) Eavesdropping
c) Scams
d) Exploits
e) Denial of service
If your computer keeps rebooting itself, then it is likely that _______.
a) It has a virus
b) It does not have enough memory
c) There is no printer
d) There has been a power surge
d) It needs a CD-ROM
23
Answer: (b)
Answer: (b)
Answer: (a)
_________ is the action of recording the keys struck on a keyboard, typically covertly, so that
the person using the keyboard is unaware that their actions are being monitored.
a) Denial of service
b) Exploits
c) Scams
d) Keylogging
e) Spamming
______ is the part of malware such as worms or viruses which performs the malicious action;
deleting data, sending spam or encrypting data.
a) Denial of service
b) Exploits
c) Scams
d) Payload
e) Spamming
Which of the following is the key function of a firewall?
a) Copying
b) Monitoring
c) Commanding
d) Moving
24
Answer: (d)
Answer: (d)
Answer: (b)
A program designed to destroy data on your computer which can travel to "infect"
other computers is called a
a) infector
b) torpedo
c) hurricane
d) virus
e) disease
_____________________ is a form of virus explicitly designed to hide itself from
detection by antivirus software.
a) Macro Virus
b) Parasitic Virus
c) Stealth virus
d) Polymorphic Virus
The virus that spread in application software is called as
a) Boot virus
b) Macro virus
c) Anti virus
d) File virus 25
Answer: (d)
Answer: (b)
Answer: (c)
Virus, Trojan horse and Worms are
a) Able to harm the computer system
b) Unable to detect if present
c) User-friendly applications
d) Harmless applications resident on computer
Which of the following is a criminal activity attempting to acquire sensitive information
such as passwords, credit cards, debits by masquerading as a trustworthy person or
business in an electronic communication? [IBPS Clerk 2010]
a) Spoofing
b) Phishing
c) Stalking
d) Hacking
e) None of these
Junk email is called
a) Spam
b) Spoof
c) Sniffer Script
d) Spool
26
Answer: (a)
Answer: (b)
Answer: (a)
All of the following are examples of real security and privacy risks EXCEPT:
a) Hackers
b) Spam
c) Viruses
d) Identity theft.
_______________are often delivered to a PC through an e-mail attachment and are often
designed to do harm.
a) Viruses
b) Spam
c) Portals
d) Email messages
e) None of these
First computer virus is a
a) A hardware
b) Windows tool
c) A computer program
d) A system software
e) None of the above
27
Answer: (C)
Answer: (a)
Answer: (C)
The first computer virus is
a) Creeper
b) PARAM
c) The famous
d) HARLIE
28
Answer: (a)
Answer: (b)
Answer: (a)
29
Answer: (a)
30
Answer: (c)
Answer: (d)
31
Seek Time - the time taken for a disk drive to locate the area on the disk where the
data to be read is stored.
Latency - Latency is the amount of time a message takes to traverse a system. In
a computer network, it is an expression of how much time it takes for a packet of
data to get from one designated point to another. It is sometimes measured as
the time required for a packet to be returned to its sender.
Turnaround time - the amount of time taken to complete a process or fulfill a
request.
Execution Time / CPU time - the time spent by the system executing that task.
Answer: (c)
32
• Mnemonic code is used instead of remembering the hexcode of the
operations. Assembly code uses Mnemonic code so that it is easier to
program in Machine code.
Answer: (c)
Answer: (b)
33
Answer: (d)
Answer: (c)
Answer: (a)
34
Answer: (d)
Answer: (a)
35
A multi-user operating system (OS) is a
computersystem that allows multiple users that
are on different computers to access a
single system's OS resources simultaneously, as
shown in Figure 1. Users on the system are
connected through a network.
Time-sharing is a technique which enables
many people, located at various terminals, to use
a particular computer system at the
same time. Time-sharing or multitasking is a
logical extension of multiprogramming.
Processor's time which is shared among
multiple users simultaneously is termed as time-
sharing.
Answer: (b)
36
Answer: (c)
Answer: (c)
Answer: (d)
37
Optical mark recognition (also called optical mark reading and OMR)
is the process of capturing human-marked data from document
forms such as surveys and tests.
They are used to read questionnaires, multiple choice examination paper
in the form of lines or shaded areas.
Answer: (d)
38
Answer: (b)
Answer: (a)
Answer: (c)
39
Answer: (b)
Answer: (d)
Answer: (c)
40
Answer: (a)
Answer: (c)
Answer: (b)
41
• Multiprogramming – A computer running more than one program at a time
(like running Excel and Firefox simultaneously).
• Multitasking – Tasks sharing a common resource (like 1 CPU).
• Multiprocessing – A computer using more than one CPU at a time.
• Multithreading is an extension of multitasking.
Answer: (c)
42
Answer: (c)
43
Answer: (d)
Answer: (a)
Answer: (b)
Answer: (d)
44

More Related Content

PPT
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
 
PDF
R&c
haider1986
 
PDF
Coal 1 - introduction to assembly programming in Assembly Programming
Muhammad Taqi Hassan Bukhari
 
DOCX
Motherboard
BarojReal
 
PPTX
Break and continue in C
vishnupriyapm4
 
PPT
Chapter 3 Motherboard and BIOS
askme
 
DOCX
Computing fundamentals lab record - Polytechnics
SHAMJITH KM
 
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
 
R&c
haider1986
 
Coal 1 - introduction to assembly programming in Assembly Programming
Muhammad Taqi Hassan Bukhari
 
Motherboard
BarojReal
 
Break and continue in C
vishnupriyapm4
 
Chapter 3 Motherboard and BIOS
askme
 
Computing fundamentals lab record - Polytechnics
SHAMJITH KM
 

What's hot (12)

PPTX
File Allocation methods in Operating Systems
jdatta247
 
PDF
C Programming Assignment
Vijayananda Mohire
 
PPTX
Introduction to Assembly Language
ApekshaShinde6
 
DOCX
Instruction set of 8086 Microprocessor
Velalar College of Engineering and Technology
 
PDF
Writing algorithms
Krishna Chaytaniah
 
PPTX
BIOS basic input output system
Vipul Buchade
 
PPTX
introduction to computer hardware
Bikramjeet Sidhu
 
PDF
[144]mobile앱에서 효율적인 storage 접근 방법
NAVER D2
 
PPTX
Presentation on computer data storage
GLG
 
PPTX
Sad considerations for-candidate_system
Swapnil Walde
 
PPT
Processes Control Block (Operating System)
Imdad Ullah
 
File Allocation methods in Operating Systems
jdatta247
 
C Programming Assignment
Vijayananda Mohire
 
Introduction to Assembly Language
ApekshaShinde6
 
Instruction set of 8086 Microprocessor
Velalar College of Engineering and Technology
 
Writing algorithms
Krishna Chaytaniah
 
BIOS basic input output system
Vipul Buchade
 
introduction to computer hardware
Bikramjeet Sidhu
 
[144]mobile앱에서 효율적인 storage 접근 방법
NAVER D2
 
Presentation on computer data storage
GLG
 
Sad considerations for-candidate_system
Swapnil Walde
 
Processes Control Block (Operating System)
Imdad Ullah
 
Ad

Similar to RRB JE Stage 2 Computer and Applications Questions Part 5 (20)

PPTX
Final malacious softwares
Mirza Adnan Baig
 
PPTX
MALWARE AND ITS TYPES
Sagilasagi1
 
PPT
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
PPTX
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
PPTX
Harmful software
BijoKG2
 
PPS
Virus & Computer security threats
Azri Abdin
 
PPS
Computer Security threat
Azri Abdin
 
PPTX
computer virus ppt.pptx
Abiniyavk
 
PDF
Computer Virus and Antivirus MCQ Question
SONU HEETSON
 
PPTX
Computer Virus.pptx
ZainAli955566
 
PPTX
Information security and privacy
Joy Chakraborty
 
PPTX
Information security and privacy
Joy Chakraborty
 
PPTX
Virus worm trojan
100701982
 
PDF
Computer/Cyber/IT Security MCQ Questions
SONU HEETSON
 
PPTX
Chapter 11 Malicious Software - HCMUT.pptx
PHHPHANTHIN
 
PPTX
Computer security ethics_and_privacy
Ardit Meti
 
PPTX
Computer virus
arif srk
 
PPTX
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
PPTX
Malicious software and software security
Prachi Gulihar
 
Final malacious softwares
Mirza Adnan Baig
 
MALWARE AND ITS TYPES
Sagilasagi1
 
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Harmful software
BijoKG2
 
Virus & Computer security threats
Azri Abdin
 
Computer Security threat
Azri Abdin
 
computer virus ppt.pptx
Abiniyavk
 
Computer Virus and Antivirus MCQ Question
SONU HEETSON
 
Computer Virus.pptx
ZainAli955566
 
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Joy Chakraborty
 
Virus worm trojan
100701982
 
Computer/Cyber/IT Security MCQ Questions
SONU HEETSON
 
Chapter 11 Malicious Software - HCMUT.pptx
PHHPHANTHIN
 
Computer security ethics_and_privacy
Ardit Meti
 
Computer virus
arif srk
 
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Malicious software and software security
Prachi Gulihar
 
Ad

More from CAS (20)

PPTX
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
 
PPTX
Introduction to IoT Security
CAS
 
PPTX
Introduction to research methodology
CAS
 
PPTX
Can you solve this
CAS
 
PPTX
Symmetric encryption and message confidentiality
CAS
 
PPTX
Public key cryptography and message authentication
CAS
 
PPTX
Malicious software
CAS
 
PPTX
Legal and ethical aspects
CAS
 
PPT
IT Security management and risk assessment
CAS
 
PPTX
It security controls, plans, and procedures
CAS
 
PPTX
Intrusion detection
CAS
 
PPTX
Human resources security
CAS
 
PPT
Database security
CAS
 
PPTX
Cryptographic tools
CAS
 
PPT
Internet security association and key management protocol (isakmp)
CAS
 
PPT
IP Security Part 2
CAS
 
PPT
IP security Part 1
CAS
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
 
Introduction to IoT Security
CAS
 
Introduction to research methodology
CAS
 
Can you solve this
CAS
 
Symmetric encryption and message confidentiality
CAS
 
Public key cryptography and message authentication
CAS
 
Malicious software
CAS
 
Legal and ethical aspects
CAS
 
IT Security management and risk assessment
CAS
 
It security controls, plans, and procedures
CAS
 
Intrusion detection
CAS
 
Human resources security
CAS
 
Database security
CAS
 
Cryptographic tools
CAS
 
Internet security association and key management protocol (isakmp)
CAS
 
IP Security Part 2
CAS
 
IP security Part 1
CAS
 

Recently uploaded (20)

PPTX
FSS seminar-cours-work the future of material surfaces.pptx
sanjaychief112
 
PDF
Mankiw Principles of Microeconomics 2016
NeilJohnTomandao
 
PPTX
Python-vs-Core-Java-A-Comparative-Deep-Dive.pptx.pptx
sachinkesharwani503
 
PPTX
Induction_Orientation_PPT.pptx for new joiners
baliyannisha12345
 
PDF
LeadIAS – Best IAS Coaching in Kerala.pdf
LeadIAS
 
PPTX
Presentation saif 8.pptx Flowers bloom though storms may stay, They find thei...
gemarking678
 
PDF
Upgrade Your Career with HR Management Training in Chandigarh – Wavy Informatics
Wavy Informatics
 
PPTX
Quattro Resourcing - Recruitment that works for you
neilsimon919
 
PPTX
opportunities in biophysics for Bsc.pptx
MukeshPimpliskar2
 
PPTX
Jaipur Sees Exponential Growth in Data Analytics Jobs Salarite Smart Hiring P...
vinay salarite
 
PPTX
PPT Lapkas helminthiasiiiiiiiiiiiiis.pptx
ratnaernawati4
 
PPTX
Soil_Health_Card_Template_Style.pptxkkki
Akash486765
 
PPTX
MARIMUTHU .pptxwthvdtsdghggggyhyyyxghhce
sakthick46
 
PPTX
Title The Power of Oral Communication (2).pptx
amankumar7762044
 
PDF
Left Holding the Bag sequence 3 Storyboard by Mark G.
MarkGalez
 
PPTX
FIND ODD SHAPE OUT for placement activity.pptx
YESIMSMART
 
DOCX
The Basics of British Sign Language.docx
biloguard123
 
PDF
Left Holding the Bag sequence 1 storyboard by Mark G.
MarkGalez
 
PDF
Fortinet LAN Edge Architect FCSS_LED_AR-7.6 Certification Study Guide.pdf
sabrina pinto
 
PDF
Left Holding the Bag sequence 2 Storyboard by Mark G
MarkGalez
 
FSS seminar-cours-work the future of material surfaces.pptx
sanjaychief112
 
Mankiw Principles of Microeconomics 2016
NeilJohnTomandao
 
Python-vs-Core-Java-A-Comparative-Deep-Dive.pptx.pptx
sachinkesharwani503
 
Induction_Orientation_PPT.pptx for new joiners
baliyannisha12345
 
LeadIAS – Best IAS Coaching in Kerala.pdf
LeadIAS
 
Presentation saif 8.pptx Flowers bloom though storms may stay, They find thei...
gemarking678
 
Upgrade Your Career with HR Management Training in Chandigarh – Wavy Informatics
Wavy Informatics
 
Quattro Resourcing - Recruitment that works for you
neilsimon919
 
opportunities in biophysics for Bsc.pptx
MukeshPimpliskar2
 
Jaipur Sees Exponential Growth in Data Analytics Jobs Salarite Smart Hiring P...
vinay salarite
 
PPT Lapkas helminthiasiiiiiiiiiiiiis.pptx
ratnaernawati4
 
Soil_Health_Card_Template_Style.pptxkkki
Akash486765
 
MARIMUTHU .pptxwthvdtsdghggggyhyyyxghhce
sakthick46
 
Title The Power of Oral Communication (2).pptx
amankumar7762044
 
Left Holding the Bag sequence 3 Storyboard by Mark G.
MarkGalez
 
FIND ODD SHAPE OUT for placement activity.pptx
YESIMSMART
 
The Basics of British Sign Language.docx
biloguard123
 
Left Holding the Bag sequence 1 storyboard by Mark G.
MarkGalez
 
Fortinet LAN Edge Architect FCSS_LED_AR-7.6 Certification Study Guide.pdf
sabrina pinto
 
Left Holding the Bag sequence 2 Storyboard by Mark G
MarkGalez
 

RRB JE Stage 2 Computer and Applications Questions Part 5

  • 1. PREVIOUS YEARS QUESTIONS WITH ANSWER AND EXPLANATION Part - 5 [email protected] https://www.facebook.com/VRRAcademy www.youtube/VRR Academy 1
  • 2. 2 VIRUS: Vital Information Resource Under Siege. • Computer virus is a small software program that spreads from one computer to another and that interferes with computer operation. • A piece of software that infects programs • modifies them to include a copy of the virus • replicates and goes on to infect other content • easily spread through network environments
  • 3. 1. Boot sector infector: Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus (poly boot.B, anti EXE etc.) 2. File infector: Infects files that the operating system considers to be executable (*.exe, *.com) 3. Macro virus: It infects files that are created using certain applications or programs that contain macros like .doc, .xls .ppts etc. (Ex: Melissa) 4. Multipartite virus: Infects files in multiple ways (Ex: Flip) 5. Encrypted virus: A portion of the virus creates a random encryption key and encrypts the remainder of the virus. 3
  • 4. 4 6. Stealth virus: A form of virus explicitly designed to hide itself from detection by anti-virus software 7. Polymorphic virus: A virus that mutates with every infection / goes on to create a large number of copies (Ex: Elkern, Tuareg) 8. Metamorphic virus: A virus that mutates and rewrites itself completely at each iteration and may change behavior as well as appearance. 9. Web scripting virus: Many websites execute Complex code in order to provide interesting content. These websites are sometimes created with purposely infected code. (Ex: JS. Fortnight) 10. FAT virus: It is used to store all the information about the location of files, unusable space etc. (Ex: Link virus)
  • 5. 11. File system virus: It is also called cluster virus or directory virus. It infects the directory of your computer by changing the path that indicates the location of a file. (Ex: Dir-2 virus) 12. Overwrite virus : It deletes the information contained in the files that it infects, rendering them partially or totally useless, once they have been infected. (Ex: Way, Trj.Reboot, Trivial.88-D etc.) 13. Direct action virus: It comes into action when the files containing the virus is executed. it infects files in the folder that are specified in the AUTOEXEC.BAT file path. (Eg. vienna virus) 14. Resident virus : It's fixes themselves into the systems memory and get activated whenever the operating system runs and infects all the files that are then opened. It hides in the RAM memory and stays there even after the malicious code is executed. (E.g., Randex, Meve etc.) 5
  • 6.  It is a computer program that replicates itself in order to spread to other computers.  Worms almost always cause atleast some harm to the network, even if only by consuming bandwidth, where as virus almost always corrupt or modify files on a targeted computer.  worms are hard to detect because they are invisible files.  Eg: Bagle, I love you, Morris etc.  e-mail worms spread in macro or script code included in attachments and instant messenger file transfers 6
  • 7.  It is a non- self- replicating type of Malware which appears to perform a desirable function but instead facilitates unauthorised access to the users computer system.  Trojans do not attempt to inject themselves into other files like a computer virus.  Trojan Horses may Steal information, or harm their host computer systems.  Trojan Horse install via online games or internet driven application in order to reach the target computers.  It is non-replicating in nature.  e.g., beast, zeroAccess Rootkit etc. 7
  • 8. The sources of virus could be: 1. Downloadable programs 2. Cracked software 3. Internet 4. Email attachments 5. Booting from unknown CD / USB Drive 8
  • 9. EFFECTS OF VIRUS Depending on the types of virus their effects on the computer are:-  Destroy all data on your local disk.  Slow down your computer performance.  Monitor what are you doing.  Download illegal files onto your computer without being able to delete them.  Generates IP address randomly and sends those IP address automatically.  Steal confidential information like password, account number, credit card information by random e-mailing.  May increase or decrease memory size.  Display different types of error messages.  Alter PC settings.  Cause computer to make strange noises make music, clicking noises or beeps. 9
  • 10.  Spyware is program which is installed on a computer system to spy on the system owner's activity and collects all the information which is misused afterwards.  Spyware can transmit personal information to another person's computer over the internet. Spyware can harm in many ways like:- 1. Steal your password. 2. Observe your browsing choices. 3. Redirect your web browser to phishing pages. 4. Can alter your computer settings ( web browser, home page settings or placement of your desktop icon). e.g., cool web search, FinFisher, 10
  • 11. SPOOFING  Spoofing is a technique to access the unauthorised data without concerning to the authorised user over the network. 11 HACKING • It is Act of intruding into someone else's computer or network. • It prevents the authorised users from accessing the resources of the computer. • Taking administrative privileges.
  • 12. PHISHING  It is an attempt to fraudulently acquire sensitive information such as passwords, credit cards details, etc by masquerading as a trustworthy person.  It is an act of sending unsolicited bulk messages in the form of emails.  It is a subset of electronic spam involving nearly identical messages sent to numerous recipient by emails.  It is a type of internet fraud that seeks to acquire a user's credential by deception. 12
  • 13.  It is an act of sending unsolicited bulk messages in the form of emails.  It is a subset of electronic spam involving nearly identical messages sent to numerous recipient by emails. 13
  • 14. ROOTKITS  Rootkit is a set of software tools that enables an unauthorized user to gain control of a computer system without being detected.  Rootkits can change how the operating system functions.  Rootkits are also difficult to remove, in some cases, require a complete re-installation of the operating system. 14
  • 15. LOGIC BOMB  It is a malicious program intentionally inserted into software system and is timed to cause harm at certain Point in time but is inactive until that point.  Unlike virus it does not replicate itself. 15
  • 16.  Safeguards or solutions to protect computer system from unauthorised access and threats are: 1. ANTIVIRUS SOFTWARE  Avast, K7, AVG, Kaspersky, Quick Heal, Norton, Trend micro, McAfree, Symantec 2. DIGITAL CERTIFICATE 3. DIGITAL SIGNATURE 4. PASSOWRD 5. FIREWALL 16
  • 17. 2. DIGITAL CERTIFICATE  Digital Certificate is the attachment to an electronic message used for security purposes.  The common use of a Digital Certificate is to verify that a user sending a message is who he or she claims to be.  Certification Authority (CA) 17
  • 18.  It is an electronic form of a signature that can be used to authenticate  the identity of the sender of a message or the signer of a document. 18
  • 19.  A firewall can either be software based or hardware based and is used to help in keeping a network secure.  Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on predetermined rule set. 19
  • 20. 20 The five types of firewall are: 1. Packet filtering firewall 2. Circuit-level gateway 3. Stateful inspection firewall 4. Application-level gateway (aka proxy firewall) 5. Next-generation firewall (NGFW)
  • 21. Which of the following is the type of software that has self-replicating software that causes damage to files and system? a) Viruses b) Trojan horses c) Bots d) Worms e) Backdoors Which of the following is a program capable of continually replicating with little or no user intervention? a) Virus b) Trojan horses c) Rootkit d) Worms e) Bots Which of the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited? a) Backdoors b) Adware c) Malware d) Bots e) Spyware 21 Answer: (d) Answer: (a) Answer: (b)
  • 22. What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.? a) Backdoors b) Key-logger c) Malware d) Bots e) Spyware What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits? a) Backdoors b) Key-logger c) Malware d) Antiware e) Spyware Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code. a) Trojans b) Viruses c) Worm d) Adware e) Bots 22 Answer: (c) Answer: (e) Answer: (a)
  • 23. _________ are computer programs that are designed by attackers to gain root or administrative access to your computer. a) Backdoors b) Rootkits c) Malware d) Antiware e) Spyware The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____ a) Phishing b) Eavesdropping c) Scams d) Exploits e) Denial of service If your computer keeps rebooting itself, then it is likely that _______. a) It has a virus b) It does not have enough memory c) There is no printer d) There has been a power surge d) It needs a CD-ROM 23 Answer: (b) Answer: (b) Answer: (a)
  • 24. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. a) Denial of service b) Exploits c) Scams d) Keylogging e) Spamming ______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data. a) Denial of service b) Exploits c) Scams d) Payload e) Spamming Which of the following is the key function of a firewall? a) Copying b) Monitoring c) Commanding d) Moving 24 Answer: (d) Answer: (d) Answer: (b)
  • 25. A program designed to destroy data on your computer which can travel to "infect" other computers is called a a) infector b) torpedo c) hurricane d) virus e) disease _____________________ is a form of virus explicitly designed to hide itself from detection by antivirus software. a) Macro Virus b) Parasitic Virus c) Stealth virus d) Polymorphic Virus The virus that spread in application software is called as a) Boot virus b) Macro virus c) Anti virus d) File virus 25 Answer: (d) Answer: (b) Answer: (c)
  • 26. Virus, Trojan horse and Worms are a) Able to harm the computer system b) Unable to detect if present c) User-friendly applications d) Harmless applications resident on computer Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit cards, debits by masquerading as a trustworthy person or business in an electronic communication? [IBPS Clerk 2010] a) Spoofing b) Phishing c) Stalking d) Hacking e) None of these Junk email is called a) Spam b) Spoof c) Sniffer Script d) Spool 26 Answer: (a) Answer: (b) Answer: (a)
  • 27. All of the following are examples of real security and privacy risks EXCEPT: a) Hackers b) Spam c) Viruses d) Identity theft. _______________are often delivered to a PC through an e-mail attachment and are often designed to do harm. a) Viruses b) Spam c) Portals d) Email messages e) None of these First computer virus is a a) A hardware b) Windows tool c) A computer program d) A system software e) None of the above 27 Answer: (C) Answer: (a) Answer: (C)
  • 28. The first computer virus is a) Creeper b) PARAM c) The famous d) HARLIE 28 Answer: (a) Answer: (b) Answer: (a)
  • 31. 31 Seek Time - the time taken for a disk drive to locate the area on the disk where the data to be read is stored. Latency - Latency is the amount of time a message takes to traverse a system. In a computer network, it is an expression of how much time it takes for a packet of data to get from one designated point to another. It is sometimes measured as the time required for a packet to be returned to its sender. Turnaround time - the amount of time taken to complete a process or fulfill a request. Execution Time / CPU time - the time spent by the system executing that task. Answer: (c)
  • 32. 32 • Mnemonic code is used instead of remembering the hexcode of the operations. Assembly code uses Mnemonic code so that it is easier to program in Machine code. Answer: (c) Answer: (b)
  • 35. 35 A multi-user operating system (OS) is a computersystem that allows multiple users that are on different computers to access a single system's OS resources simultaneously, as shown in Figure 1. Users on the system are connected through a network. Time-sharing is a technique which enables many people, located at various terminals, to use a particular computer system at the same time. Time-sharing or multitasking is a logical extension of multiprogramming. Processor's time which is shared among multiple users simultaneously is termed as time- sharing. Answer: (b)
  • 37. 37 Optical mark recognition (also called optical mark reading and OMR) is the process of capturing human-marked data from document forms such as surveys and tests. They are used to read questionnaires, multiple choice examination paper in the form of lines or shaded areas. Answer: (d)
  • 41. 41 • Multiprogramming – A computer running more than one program at a time (like running Excel and Firefox simultaneously). • Multitasking – Tasks sharing a common resource (like 1 CPU). • Multiprocessing – A computer using more than one CPU at a time. • Multithreading is an extension of multitasking. Answer: (c)
  • 44. 44