141. What is a behavior-based antivirus?
a. An antivirus software that identifies viruses by their unique code patterns.
b. An antivirus software that uses behavioral analysis to detect viruses.
c. An antivirus software that blocks known malicious websites.
d. None of the above.
142. What is a heuristic-based antivirus?
a. An antivirus software that identifies viruses by their unique code patterns.
b. An antivirus software that uses behavioral analysis to detect viruses.
c. An antivirus software that blocks known malicious websites.
d. None of the above.
143. What is a Trojan horse?
a. A type of virus that spreads by attaching itself to executable files.
b. A type of virus that spreads through email.
c. Malware that disguises itself as legitimate software to trick the user into downloading and installing it.
d. A type of virus that spreads through instant messaging.
144. What is a phishing email?
a. An email that tries to trick the recipient into revealing sensitive information or clicking on a malicious link.
b. An email that contains a virus or other malware.
c. An email that asks the recipient to forward it to all their contacts.
d. None of the above.
145. How does a worm spread?
a. By attaching itself to executable files.
b. By tricking the user into downloading and installing it.
c. By exploiting security vulnerabilities in the operating system or software.
d. By spreading through email attachments.
146. What is the purpose of spyware?
a. To monitor the victim’s activity and steal sensitive information.
b. To display unwanted ads or pop-ups.
c. To spread to other computers and create a botnet.
d. To encrypt the victim’s data and demand payment in exchange for the decryption key.
147. What is adware?
a. Malware that displays unwanted ads or pop-ups.
b. Malware that encrypts the victim’s data and demands payment in exchange for the decryption key.
c. Malware that spreads by copying itself to other computers.
d. Malware that steals sensitive information from the victim’s computer.
148. How does adware work?
a. By displaying unwanted ads or pop-ups on the victim’s computer.
b. By stealing sensitive information from the victim’s computer.
c. By spreading to other computers and creating a botnet.
d. By encrypting the victim’s data and demanding payment in exchange for the decryption key.
149. What is ethical hacking?
a. Hacking that is done with the permission of the system owner to identify security vulnerabilities.
b. Hacking that is done to cause harm or damage to a computer system or network.
c. Hacking that is done for personal gain or financial profit.
d. None of the above.
150. What is a script kiddie?
a. A person who uses pre-written scripts or tools to hack into computer systems or networks without any technical knowledge or expertise.
b. A person who hacks with malicious intent.
c. A person who hacks with the permission of the system owner to identify security vulnerabilities.
d. None of the above.