Internet & Virus MCQs (201-300)
Which of the following is a web browser?
a) Chrome
b) Gmail
c) Zoom
d) Word
Answer: a) ChromeWhich browser is developed by Mozilla Foundation?
a) Firefox
b) Chrome
c) Edge
d) Safari
Answer: a) FirefoxWhich browser is the default on Windows 10 and 11?
a) Microsoft Edge
b) Chrome
c) Firefox
d) Opera
Answer: a) Microsoft EdgeWhich of the following browsers is based on Chromium?
a) Google Chrome
b) Safari
c) Firefox
d) Internet Explorer
Answer: a) Google ChromeWhich browser feature stores visited websites for faster loading later?
a) Cache
b) Cookie
c) History
d) Bookmark
Answer: a) CacheWhich of the following is used to save website addresses for future reference?
a) Bookmark
b) Cache
c) Cookie
d) History
Answer: a) BookmarkWhich browser feature stores login credentials for websites?
a) Password manager
b) Cache
c) History
d) Bookmark
Answer: a) Password managerWhich of the following is a lightweight browser known for speed and privacy?
a) Opera
b) Chrome
c) Edge
d) Safari
Answer: a) OperaWhich browser is developed by Apple?
a) Safari
b) Firefox
c) Chrome
d) Edge
Answer: a) SafariWhich browser feature deletes temporary files and history automatically?
a) Private browsing (Incognito)
b) Bookmark
c) Cookie
d) Cache
Answer: a) Private browsing (Incognito)Which of these browsers supports extensions and add-ons?
a) Chrome
b) Internet Explorer
c) Safari
d) Edge
Answer: a) ChromeWhich of the following is a portable browser that can run from a USB drive?
a) Portable Firefox
b) Chrome
c) Safari
d) Edge
Answer: a) Portable FirefoxWhich browser setting blocks pop-ups?
a) Pop-up blocker
b) History
c) Cache
d) Cookie
Answer: a) Pop-up blockerWhich of the following is an open-source browser?
a) Firefox
b) Chrome
c) Safari
d) Edge
Answer: a) FirefoxWhich browser feature helps in storing small pieces of website data?
a) Cookies
b) Cache
c) Bookmark
d) History
Answer: a) CookiesWhich browser is known for its built-in VPN?
a) Opera
b) Chrome
c) Firefox
d) Edge
Answer: a) OperaWhich of these is a browser toolbar feature?
a) Navigation buttons
b) Cache
c) Cookies
d) History
Answer: a) Navigation buttonsWhich browser supports reading mode for distraction-free web reading?
a) Firefox
b) Chrome
c) Edge
d) Safari
Answer: a) FirefoxWhich browser allows synchronization across multiple devices?
a) Chrome
b) Internet Explorer
c) Safari
d) Edge
Answer: a) ChromeWhich of the following is a common type of computer virus?
a) Trojan
b) Cookie
c) Cache
d) Bookmark
Answer: a) TrojanWhich type of virus disguises itself as legitimate software?
a) Trojan
b) Worm
c) Spyware
d) Adware
Answer: a) Trojan
A virus that spreads without user intervention via networks is called:
a) Worm
b) Trojan
c) Spyware
d) Rootkit
Answer: a) WormWhich virus hides its presence and controls a system remotely?
a) Rootkit
b) Worm
c) Trojan
d) Adware
Answer: a) RootkitMalware that records keystrokes to steal information is called:
a) Keylogger
b) Trojan
c) Worm
d) Adware
Answer: a) KeyloggerA virus that attaches itself to files and programs is called:
a) File-infecting virus
b) Trojan
c) Worm
d) Spyware
Answer: a) File-infecting virusMalware designed to display unwanted ads is called:
a) Adware
b) Worm
c) Trojan
d) Keylogger
Answer: a) AdwareWhich of the following is used to remove viruses from a computer?
a) Antivirus
b) Browser
c) Firewall
d) Cookie
Answer: a) AntivirusWhich browser security feature warns users about malicious websites?
a) Safe Browsing
b) Bookmark
c) History
d) Cache
Answer: a) Safe BrowsingWhich of the following viruses is often spread via email attachments?
a) Email virus
b) Trojan
c) Worm
d) Spyware
Answer: a) Email virusMalware that encrypts files and demands ransom is called:
a) Ransomware
b) Trojan
c) Worm
d) Spyware
Answer: a) RansomwareWhich of these is a free malware removal tool?
a) Malwarebytes
b) Chrome
c) Firefox
d) Edge
Answer: a) MalwarebytesWhich browser feature prevents tracking by websites?
a) Do Not Track
b) Bookmark
c) History
d) Cache
Answer: a) Do Not TrackMalware that spreads through USB drives is called:
a) Autorun virus
b) Trojan
c) Spyware
d) Adware
Answer: a) Autorun virusA virus that activates at a specific date or time is called:
a) Logic bomb
b) Worm
c) Trojan
d) Spyware
Answer: a) Logic bombMalware that secretly collects information about a user is called:
a) Spyware
b) Trojan
c) Worm
d) Keylogger
Answer: a) SpywareWhich of the following is a browser extension that protects against malicious websites?
a) Antivirus plugin
b) Cache
c) Cookie
d) History
Answer: a) Antivirus pluginMalware that infects the system boot sector is called:
a) Boot sector virus
b) Trojan
c) Worm
d) Adware
Answer: a) Boot sector virusWhich of these browser settings enhances online security by clearing data after each session?
a) Clear browsing data on exit
b) Enable pop-ups
c) Save passwords
d) Bookmark all pages
Answer: a) Clear browsing data on exitMalware disguised as legitimate antivirus software is called:
a) Rogue security software
b) Trojan
c) Worm
d) Keylogger
Answer: a) Rogue security softwareWhich type of malware replicates itself and spreads to other computers?
a) Worm
b) Trojan
c) Spyware
d) Adware
Answer: a) Worm
Which of these protects a computer from unauthorized network access?
a) Firewall
b) Cache
c) Cookie
d) History
Answer: a) FirewallMalware that installs additional malicious programs without user consent is called:
a) Downloader
b) Trojan
c) Worm
d) Spyware
Answer: a) DownloaderWhich type of malware tricks users into clicking links to steal personal information?
a) Phishing
b) Worm
c) Trojan
d) Spyware
Answer: a) PhishingWhich browser feature blocks scripts from running on suspicious websites?
a) Script blocker
b) Bookmark
c) Cache
d) History
Answer: a) Script blockerMalware that changes system settings to disrupt operation is called:
a) Virus
b) Worm
c) Trojan
d) Spyware
Answer: a) VirusWhich of the following protects browsers against malicious downloads?
a) Download scanner
b) Cache
c) Cookie
d) History
Answer: a) Download scannerMalware that secretly mines cryptocurrency on your computer is called:
a) Cryptojacker
b) Trojan
c) Worm
d) Spyware
Answer: a) CryptojackerMalware that locks screens or devices until a ransom is paid is called:
a) Ransomware
b) Trojan
c) Worm
d) Adware
Answer: a) RansomwareMalware that automatically sends itself to contacts in email is called:
a) Email worm
b) Trojan
c) Spyware
d) Adware
Answer: a) Email wormWhich browser feature warns about unsafe downloads or files?
a) Security warnings
b) Cache
c) Bookmark
d) History
Answer: a) Security warningsMalware that monitors online activity for sensitive data is called:
a) Spyware
b) Worm
c) Trojan
d) Adware
Answer: a) SpywareWhich type of virus modifies system files to remain undetectable?
a) Polymorphic virus
b) Trojan
c) Worm
d) Keylogger
Answer: a) Polymorphic virusMalware that displays fake system alerts to scare users is called:
a) Scareware
b) Trojan
c) Worm
d) Adware
Answer: a) ScarewareWhich of these browser settings enhances privacy while browsing?
a) Private/Incognito mode
b) Enable pop-ups
c) Save passwords
d) Allow cookies
Answer: a) Private/Incognito modeMalware that logs network traffic to steal information is called:
a) Packet sniffer
b) Worm
c) Trojan
d) Keylogger
Answer: a) Packet snifferMalware that activates when a specific condition is met is called:
a) Logic bomb
b) Trojan
c) Worm
d) Spyware
Answer: a) Logic bombWhich of these browser features blocks access to known phishing websites?
a) Anti-phishing filter
b) Cache
c) Bookmark
d) History
Answer: a) Anti-phishing filterMalware that changes the homepage or search engine of a browser is called:
a) Browser hijacker
b) Trojan
c) Worm
d) Spyware
Answer: a) Browser hijackerMalware that secretly installs ads or toolbars without permission is called:
a) Adware
b) Worm
c) Trojan
d) Keylogger
Answer: a) AdwareMalware that exploits vulnerabilities in software to spread is called:
a) Exploit
b) Worm
c) Trojan
d) Spyware
Answer: a) ExploitWhich browser feature blocks tracking scripts from collecting data?
a) Do Not Track
b) Cache
c) Bookmark
d) History
Answer: a) Do Not TrackWhich of the following browsers is known for strong privacy features by default?
a) Brave
b) Chrome
c) Edge
d) Internet Explorer
Answer: a) BraveWhich browser feature prevents automatic downloads from unsafe sites?
a) Download protection
b) Bookmark
c) Cache
d) History
Answer: a) Download protectionWhich of these browsers allows users to manage site permissions (camera, microphone, location)?
a) Chrome
b) Firefox
c) Safari
d) All of the above
Answer: d) All of the aboveWhich browser feature removes tracking cookies and browsing history after closing the browser?
a) Private browsing / Incognito mode
b) Cache
c) Bookmark
d) Autofill
Answer: a) Private browsing / Incognito modeWhich type of virus can infect both files and the boot sector?
a) Hybrid virus
b) Trojan
c) Worm
d) Adware
Answer: a) Hybrid virusWhich of these is an online security measure to prevent identity theft?
a) Two-factor authentication
b) Cache
c) Bookmark
d) History
Answer: a) Two-factor authenticationWhich browser feature warns about entering passwords on insecure (non-HTTPS) websites?
a) Security warning
b) Cache
c) Bookmark
d) History
Answer: a) Security warningWhich type of malware pretends to be legitimate software but performs malicious activities?
a) Trojan
b) Worm
c) Adware
d) Keylogger
Answer: a) TrojanWhich browser feature automatically fills forms and passwords securely?
a) Autofill / Password manager
b) Cache
c) Bookmark
d) History
Answer: a) Autofill / Password managerMalware that self-replicates and spreads over the internet without user action is called:
a) Worm
b) Trojan
c) Spyware
d) Adware
Answer: a) WormWhich of the following is a recommended practice to prevent malware infection?
a) Regularly update software
b) Use outdated software
c) Disable antivirus
d) Click unknown links
Answer: a) Regularly update softwareMalware that hijacks system resources to mine cryptocurrency secretly is called:
a) Cryptojacker
b) Trojan
c) Worm
d) Adware
Answer: a) CryptojackerWhich browser security feature checks website certificates for authenticity?
a) SSL/TLS validation
b) Cache
c) Bookmark
d) History
Answer: a) SSL/TLS validationWhich of the following viruses can remain dormant until activated by a specific action?
a) Logic bomb
b) Trojan
c) Worm
d) Adware
Answer: a) Logic bombMalware that collects sensitive information such as banking details is called:
a) Spyware
b) Trojan
c) Worm
d) Adware
Answer: a) SpywareWhich of the following prevents websites from tracking user activities across the web?
a) VPN (Virtual Private Network)
b) Cache
c) Bookmark
d) History
Answer: a) VPN (Virtual Private Network)Which browser security measure blocks malicious scripts from running automatically?
a) Script blocker
b) Cache
c) Bookmark
d) History
Answer: a) Script blockerMalware that redirects browsers to unwanted websites is called:
a) Browser hijacker
b) Trojan
c) Worm
d) Spyware
Answer: a) Browser hijackerWhich of these practices improves safe browsing on the Internet?
a) Avoid clicking unknown links
b) Open unknown email attachments
c) Disable antivirus
d) Use outdated browsers
Answer: a) Avoid clicking unknown linksMalware that records user actions on a device is called:
a) Keylogger
b) Trojan
c) Worm
d) Adware
Answer: a) KeyloggerWhich of the following browsers has built-in phishing and malware protection?
a) Chrome
b) Internet Explorer
c) Safari
d) Opera
Answer: a) ChromeWhich of these protects a computer from unauthorized access over a network?
a) Firewall
b) Cache
c) Cookie
d) History
Answer: a) FirewallMalware that disguises itself as a useful program but steals information is called:
a) Trojan
b) Worm
c) Spyware
d) Adware
Answer: a) TrojanWhich of these browser settings increases security by not saving passwords automatically?
a) Disable password saving
b) Enable autofill
c) Enable cookies
d) Enable pop-ups
Answer: a) Disable password savingMalware that spreads via infected email attachments is called:
a) Email virus
b) Trojan
c) Worm
d) Spyware
Answer: a) Email virusWhich of these practices prevents browser hijacking?
a) Avoid installing unknown extensions
b) Click all pop-ups
c) Download from unknown sources
d) Disable antivirus
Answer: a) Avoid installing unknown extensionsMalware that encrypts files and demands payment to decrypt is called:
a) Ransomware
b) Trojan
c) Worm
d) Adware
Answer: a) RansomwareWhich browser feature allows viewing website content without storing history?
a) Incognito / Private mode
b) Cache
c) Bookmark
d) History
Answer: a) Incognito / Private modeMalware that silently collects personal data without the user’s consent is called:
a) Spyware
b) Worm
c) Trojan
d) Adware
Answer: a) SpywareWhich of the following is recommended to prevent malware infection?
a) Keep operating system and browsers updated
b) Disable antivirus
c) Click unknown links
d) Use outdated software
Answer: a) Keep operating system and browsers updatedMalware that shows fake alerts to scare users into buying software is called:
a) Scareware
b) Trojan
c) Worm
d) Spyware
Answer: a) ScarewareWhich browser feature protects against visiting fake websites?
a) Anti-phishing filter
b) Cache
c) Bookmark
d) History
Answer: a) Anti-phishing filterMalware that spreads via removable drives like USB sticks is called:
a) Autorun virus
b) Trojan
c) Worm
d) Spyware
Answer: a) Autorun virusWhich of these improves online privacy while browsing?
a) Use VPN
b) Enable cookies for all sites
c) Save passwords on all sites
d) Disable antivirus
Answer: a) Use VPNMalware that changes browser settings to redirect searches is called:
a) Browser hijacker
b) Trojan
c) Worm
d) Adware
Answer: a) Browser hijackerWhich type of malware exploits software vulnerabilities to gain control of a system?
a) Exploit
b) Worm
c) Trojan
d) Spyware
Answer: a) ExploitMalware that secretly mines cryptocurrency using your computer resources is called:
a) Cryptojacker
b) Trojan
c) Worm
d) Spyware
Answer: a) CryptojackerWhich browser security feature blocks harmful scripts from running on a webpage?
a) Script blocker
b) Cache
c) Bookmark
d) History
Answer: a) Script blockerThe safest practice to avoid viruses while browsing is:
a) Avoid visiting unknown or suspicious websites
b) Download unknown files
c) Click on pop-ups
d) Disable firewall
Answer: a) Avoid visiting unknown or suspicious websites