0% found this document useful (0 votes)
6 views3 pages

Computer Virus and Worms - Dynamic Quiz

The document is a dynamic quiz focused on computer viruses and worms, divided into five sections covering basic understanding, real-life examples, identifying symptoms, protection measures, and final reflections. It includes multiple-choice and true/false questions aimed at assessing knowledge on the differences between viruses and worms, notable examples, symptoms of infections, and best practices for protection. The quiz is designed to enhance awareness and understanding of cybersecurity threats.

Uploaded by

Luis Lecoña
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

Computer Virus and Worms - Dynamic Quiz

The document is a dynamic quiz focused on computer viruses and worms, divided into five sections covering basic understanding, real-life examples, identifying symptoms, protection measures, and final reflections. It includes multiple-choice and true/false questions aimed at assessing knowledge on the differences between viruses and worms, notable examples, symptoms of infections, and best practices for protection. The quiz is designed to enhance awareness and understanding of cybersecurity threats.

Uploaded by

Luis Lecoña
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Computer Virus and Worms: Dynamic Quiz

Section 1: Basic Understanding (5 minutes)

1. What is the key difference between a virus and a worm?


(A) A virus cannot replicate itself.
(B) A worm needs a host to execute.
(C) A worm spreads through networks, whereas a virus infects one host only.
(D) Both viruses and worms replicate in the same way.

2. Which of the following is an example of an email virus?


(A) Code Red
(B) Trojan Horse
(C) Melissa Virus
(D) Boot Sector Virus

3. True or False: A Trojan Horse is a virus that claims to be a harmless program, but it can
erase your hard disk.

---

Section 2: Real-Life Examples (5 minutes)

4. Which virus was the fastest spreading and forced large companies to shut down their
email systems in 1999?
(A) I Love You Virus
(B) Melissa Virus
(C) Code Red
(D) Computer Worm

5. What did the Code Red worm specifically target?


(A) Apple OS
(B) Unsecured Windows NT/2000 servers
(C) Microsoft Office programs
(D) Trojan Horse vulnerabilities

6. Which of the following actions was NOT part of the Code Red worm’s activities?
(A) Replacing web pages with a hacking message
(B) Scanning the network for vulnerabilities
(C) Corrupting Microsoft Office files
(D) Launching an attack on the White House web server

---

Section 3: Identifying Symptoms (5 minutes)

7. Which symptom suggests that your computer might be infected by a virus?


(A) The computer runs faster than usual.
(B) Strange graphics appear on your screen.
(C) You can access files more easily.
(D) The computer shows no new files.

8. Which of these actions could be a sign of a virus infection?


(A) Your computer’s hard drive is running out of space for no reason.
(B) Files that you’ve deleted reappear.
(C) Your computer makes beeping sounds randomly.
(D) All of the above

9. True or False: If your computer is infected with a virus, it is likely that new programs are
installed without your consent.

---

Section 4: Protection Measures (5 minutes)

10. What is the best way to prevent virus and worm infections?
(A) Relying on the operating system's default settings
(B) Ensuring the latest anti-virus software is installed and updating it regularly
(C) Downloading programs only from untrusted sources
(D) Using the internet without any security measures

11. Which of the following is NOT a recommended protection measure?


(A) Use a host-based firewall.
(B) Backup important files regularly.
(C) Only install anti-virus software once.
(D) Install the latest security patches and updates.
12. True or False: The best way to recover from a virus infection is to wait for a new version
of the virus definition updates.

---

Section 5: Final Reflection (5 minutes)

13. What are the four steps you should take to keep your computer secure from viruses and
worms?
(A) Update your antivirus software, ensure security patches, use a firewall, and back up files.
(B) Ignore unknown programs, disable firewalls, and only use the internet occasionally.
(C) Backup files monthly, disable antivirus software, and avoid all patches.
(D) Download any program that looks useful and ignore virus alerts.

14. If you receive an email from an unknown sender with an attachment, what should you
do?
(A) Open the attachment and check its content.
(B) Download the attachment and scan it for viruses.
(C) Delete the email without opening it.
(D) Forward the email to your contacts for review.

You might also like