CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel [Link](CS) -9751894315
Securing Computer Using Antivirus:
Securing Computer Using Antivirus
1. What is the main function of antivirus software?
a) To increase computer performance b) To protect against viruses and malware
c) To manage files on the system d) To optimize internet speed
Answer: b
Explanation: Antivirus software is designed to detect, prevent, and remove malicious software such
as viruses, worms, and Trojans that can compromise a computer's security.
2. What is a virus in the context of computer security?
a) A program that protects the computer from malware
b) A harmful program that spreads from one computer to another
c) A type of encryption software
d) A tool used for data recovery
Answer: b
Explanation: A virus is a type of malware that attaches itself to legitimate programs or files and
spreads from one computer to another, often causing harm to the system.
3. What is the role of antivirus software in preventing phishing attacks?
a) It encrypts all communications b) It blocks malicious websites and suspicious email links
c) It generates random passwords d) It scans for file integrity
Answer: b
Explanation: Antivirus software helps prevent phishing attacks by blocking access to malicious
websites and identifying suspicious email links that may attempt to steal personal information.
4. Which of the following is NOT typically a feature of antivirus software?
a) Real-time scanning b) Automatic updates
c) File backup and recovery d) Malware detection and removal
Answer: c
Explanation: File backup and recovery is not typically a feature of antivirus software; antivirus
software focuses on detecting, blocking, and removing malware.
5. How does antivirus software detect malware?
a) By monitoring unusual behavior in the operating system
b) By checking for known signatures of malicious software
c) By performing a deep analysis of files and software
d) All of the above
Answer: d
Explanation: Antivirus software uses multiple techniques such as signature-based detection,
heuristic analysis, and behavioral monitoring to detect malware on a system.
6. What is a "signature" in antivirus software?
a) A unique code representing a known virus or malware b) A user’s personal digital signature
c) A type of encryption used to protect files d) A method for restoring corrupted files
Answer: a
Explanation: A signature is a unique code or pattern associated with known viruses or malware,
allowing antivirus software to detect them by comparing files to these signatures.
7. Why are regular updates important for antivirus software?
a) To improve the system's performance b) To enhance the antivirus's ability to detect new malware threats
c) To reduce the software's size d) To prevent antivirus software from crashing
Answer: b
Explanation: Regular updates are essential to ensure the antivirus software can detect and protect
against new and evolving malware threats.
[Link] [Link](cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel [Link](CS) -9751894315
8. What is heuristic analysis in antivirus software?
a) Scanning for known malware signatures
b) Blocking unauthorized network traffic
c) Examining the behavior of suspicious programs to detect potential malware
d) Analyzing the integrity of files
Answer: c
Explanation: Heuristic analysis involves examining the behavior of programs and files to identify
potentially harmful actions that could indicate malware, even if the malware is unknown.
9. Which type of malware is designed to replicate itself and spread to other systems?
a) Worm b) Trojan c) Rootkit d) Adware
Answer: a
Explanation: A worm is a type of malware that replicates itself and spreads to other systems, often
without requiring a host file like a virus.
10. What is the function of a quarantine feature in antivirus software?
a) To restore infected files to their original state b) To isolate potentially harmful files for analysis
c) To remove malware automatically d) To prevent system crashes
Answer: b
Explanation: The quarantine feature isolates potentially harmful files so that they cannot spread or
cause further harm until they are analyzed.
11. How does antivirus software protect against ransomware attacks?
a) By blocking all external network connections
b) By preventing the execution of suspicious or untrusted programs
c) By encrypting files before they are infected
d) By automatically updating the operating system
Answer: b
Explanation: Antivirus software can help protect against ransomware by detecting and blocking
suspicious programs or actions that are characteristic of ransomware attacks.
12. What is a "Trojan horse" in the context of computer security?
a) A self-replicating program
b) A program disguised as something legitimate but is actually harmful
c) A type of encryption used in secure communications
d) A tool for protecting computer data
Answer: b
Explanation: A Trojan horse is malicious software that pretends to be a legitimate program or file,
tricking users into installing it, while it secretly causes harm or steals information.
13. What is a firewall in the context of computer security?
a) A type of antivirus software
b) A network security system that monitors and controls incoming and outgoing traffic
c) A tool used to optimize computer performance
d) A device used to physically protect computers from damage
Answer: b
Explanation: A firewall is a network security system that monitors and controls the flow of data
between a computer and the internet, helping to block unauthorized access and malicious traffic.
14. What is a key benefit of using both antivirus software and a firewall together?
a) They provide more entertainment features
b) They offer complementary layers of security for both malware and network traffic
c) They reduce the need for system updates
d) They slow down the system performance
Answer: b
Explanation: Antivirus software and firewalls provide complementary layers of security, with
antivirus focusing on detecting and removing malware and firewalls protecting against unauthorized
network access.
[Link] [Link](cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel [Link](CS) -9751894315
15. How does antivirus software help prevent zero-day attacks?
a) By blocking all incoming network traffic
b) By using behavioral analysis and heuristics to detect suspicious activity
c) By encrypting files automatically
d) By preventing access to specific websites
Answer: b
Explanation: Antivirus software can help prevent zero-day attacks by using behavioral analysis and
heuristics to detect suspicious activity and potential exploits that take advantage of unpatched
vulnerabilities.
16. What is the role of cloud-based antivirus software?
a) To store files in the cloud
b) To provide antivirus protection through cloud servers, updating definitions and scanning remotely
c) To increase computer processing speed
d) To perform file encryption in the cloud
Answer: b
Explanation: Cloud-based antivirus software leverages cloud servers to store definitions and
scanning tools, offering more up-to-date protection and reducing the system resources needed for
local scanning.
17. Which of the following is a good practice for improving the effectiveness of antivirus software?
a) Turning off automatic updates to avoid interruptions
b) Installing antivirus software on only one device
c) Regularly scanning the system and updating virus definitions
d) Using the default settings without customization
Answer: c
Explanation: Regularly scanning the system and updating virus definitions are crucial for keeping
antivirus software effective against the latest malware threats.
18. What is "spyware" in the context of computer security?
a) Software designed to monitor and collect personal information without consent
b) Software that improves system performance
c) Software used to recover lost files
d) Software that prevents system crashes
Answer: a
Explanation: Spyware is malicious software that secretly monitors and collects personal data from
users without their knowledge or consent, often for advertising or identity theft purposes.
19. How can antivirus software help protect against adware?
a) By blocking unnecessary advertisements b) By preventing the installation of unwanted ad-serving software
c) By speeding up internet browsing d) By encrypting all online communications
Answer: b
Explanation: Antivirus software can block or remove adware, which is software designed to display
unwanted advertisements, often slowing down the system and tracking user activity.
20. Which of the following is an example of a common antivirus scan type?
a) Full system scan b) Performance scan c) Internet speed scan d) Cloud backup scan
Answer: a
Explanation: A full system scan examines the entire system for potential threats, ensuring that all
files and programs are checked for malware.
21. What is the significance of a "quarantine" feature in antivirus software?
a) It restores deleted files
b) It isolates potentially harmful files for further analysis
c) It permanently removes files from the system
d) It compresses files for storage
Answer: b
Explanation: Quarantine isolates potentially harmful files, preventing them from executing while
allowing further analysis to determine whether they are malicious.
[Link] [Link](cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel [Link](CS) -9751894315
22. Why should you avoid downloading software from untrusted websites?
a) Because it may contain viruses and malware
b) Because it may increase internet speed
c) Because it is usually free
d) Because it reduces the cost of software
Answer: a
Explanation: Downloading software from untrusted websites can expose your computer to viruses,
malware, and other security risks, which antivirus software may not always catch.
23. What is "malware" in the context of computer security?
a) A type of computer software used for legal purposes
b) A type of software that improves system efficiency
c) Malicious software intended to damage or disrupt computers
d) A tool for optimizing internet performance
Answer: c
Explanation: Malware is malicious software designed to harm, exploit, or steal data from
computers, often causing system crashes or performance issues.
24. What is "rootkit" malware?
a) Malware that hides itself from detection by antivirus software
b) A type of spyware
c) Software used to monitor network traffic
d) A tool used to backup system files
Answer: a
Explanation: A rootkit is a type of malware that hides itself from antivirus detection and other
security measures, often granting unauthorized access to the system.
25. Which of the following is an example of proactive protection offered by antivirus software?
a) Scanning files after they are downloaded
b) Blocking malware in real-time
c) Removing files automatically after infection
d) Defragmenting hard drives
Answer: b
Explanation: Proactive protection refers to real-time scanning, where the antivirus actively monitors
system activity to prevent malware from being installed or executed.
26. What is the benefit of cloud-based antivirus scanning?
a) Faster detection of viruses and malware b) Reduced need for system storage
c) Greater control over system resources d) Decreased system security
Answer: a
Explanation: Cloud-based antivirus scanning offloads processing to the cloud, allowing for faster
and more efficient detection of new threats.
27. Which of the following could be considered a "false positive" in antivirus software?
a) An actual virus that is detected correctly
b) A legitimate program mistakenly flagged as malware
c) A file that is too large to scan
d) An outdated virus signature
Answer: b
Explanation: A false positive occurs when antivirus software mistakenly identifies a legitimate file
or program as malware.
28. What is the purpose of a "sandbox" feature in antivirus software?
a) To store backups of infected files b) To test suspicious files in a secure environment without risking the system
c) To recover lost files d) To manage cloud storage
Answer: b
Explanation: A sandbox is a secure testing environment where suspicious files can be executed and
analyzed without affecting the main system, helping to detect unknown threats.
[Link] [Link](cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel [Link](CS) -9751894315
29. What is the impact of running outdated antivirus software?
a) Increased system speed
b) Reduced ability to detect new threats
c) Enhanced encryption
d) Improved file recovery
Answer: b
Explanation: Outdated antivirus software may lack the latest malware definitions and security
features, reducing its ability to detect and protect against newer threats.
30. What is the first step in securing a computer with antivirus software?
a) Perform a full system scan
b) Download software from the internet
c) Update the operating system
d) Install and configure antivirus software
Answer: d
Explanation: The first step in securing a computer is to install and configure antivirus software to
ensure the system is protected from malware and other security threats.
[Link] [Link](cs) -9751894315