Internet & Virus MCQs (201-300)

  1. Which of the following is a web browser?
    a) Chrome
    b) Gmail
    c) Zoom
    d) Word
    Answer: a) Chrome

  2. Which browser is developed by Mozilla Foundation?
    a) Firefox
    b) Chrome
    c) Edge
    d) Safari
    Answer: a) Firefox

  3. Which browser is the default on Windows 10 and 11?
    a) Microsoft Edge
    b) Chrome
    c) Firefox
    d) Opera
    Answer: a) Microsoft Edge

  4. Which of the following browsers is based on Chromium?
    a) Google Chrome
    b) Safari
    c) Firefox
    d) Internet Explorer
    Answer: a) Google Chrome

  5. Which browser feature stores visited websites for faster loading later?
    a) Cache
    b) Cookie
    c) History
    d) Bookmark
    Answer: a) Cache

  6. Which of the following is used to save website addresses for future reference?
    a) Bookmark
    b) Cache
    c) Cookie
    d) History
    Answer: a) Bookmark

  7. Which browser feature stores login credentials for websites?
    a) Password manager
    b) Cache
    c) History
    d) Bookmark
    Answer: a) Password manager

  8. Which of the following is a lightweight browser known for speed and privacy?
    a) Opera
    b) Chrome
    c) Edge
    d) Safari
    Answer: a) Opera

  9. Which browser is developed by Apple?
    a) Safari
    b) Firefox
    c) Chrome
    d) Edge
    Answer: a) Safari

  10. Which browser feature deletes temporary files and history automatically?
    a) Private browsing (Incognito)
    b) Bookmark
    c) Cookie
    d) Cache
    Answer: a) Private browsing (Incognito)

  11. Which of these browsers supports extensions and add-ons?
    a) Chrome
    b) Internet Explorer
    c) Safari
    d) Edge
    Answer: a) Chrome

  12. Which of the following is a portable browser that can run from a USB drive?
    a) Portable Firefox
    b) Chrome
    c) Safari
    d) Edge
    Answer: a) Portable Firefox

  13. Which browser setting blocks pop-ups?
    a) Pop-up blocker
    b) History
    c) Cache
    d) Cookie
    Answer: a) Pop-up blocker

  14. Which of the following is an open-source browser?
    a) Firefox
    b) Chrome
    c) Safari
    d) Edge
    Answer: a) Firefox

  15. Which browser feature helps in storing small pieces of website data?
    a) Cookies
    b) Cache
    c) Bookmark
    d) History
    Answer: a) Cookies

  16. Which browser is known for its built-in VPN?
    a) Opera
    b) Chrome
    c) Firefox
    d) Edge
    Answer: a) Opera

  17. Which of these is a browser toolbar feature?
    a) Navigation buttons
    b) Cache
    c) Cookies
    d) History
    Answer: a) Navigation buttons

  18. Which browser supports reading mode for distraction-free web reading?
    a) Firefox
    b) Chrome
    c) Edge
    d) Safari
    Answer: a) Firefox

  19. Which browser allows synchronization across multiple devices?
    a) Chrome
    b) Internet Explorer
    c) Safari
    d) Edge
    Answer: a) Chrome

  20. Which of the following is a common type of computer virus?
    a) Trojan
    b) Cookie
    c) Cache
    d) Bookmark
    Answer: a) Trojan

  21. Which type of virus disguises itself as legitimate software?
    a) Trojan
    b) Worm
    c) Spyware
    d) Adware
    Answer: a) Trojan

  1. A virus that spreads without user intervention via networks is called:
    a) Worm
    b) Trojan
    c) Spyware
    d) Rootkit
    Answer: a) Worm

  2. Which virus hides its presence and controls a system remotely?
    a) Rootkit
    b) Worm
    c) Trojan
    d) Adware
    Answer: a) Rootkit

  3. Malware that records keystrokes to steal information is called:
    a) Keylogger
    b) Trojan
    c) Worm
    d) Adware
    Answer: a) Keylogger

  4. A virus that attaches itself to files and programs is called:
    a) File-infecting virus
    b) Trojan
    c) Worm
    d) Spyware
    Answer: a) File-infecting virus

  5. Malware designed to display unwanted ads is called:
    a) Adware
    b) Worm
    c) Trojan
    d) Keylogger
    Answer: a) Adware

  6. Which of the following is used to remove viruses from a computer?
    a) Antivirus
    b) Browser
    c) Firewall
    d) Cookie
    Answer: a) Antivirus

  7. Which browser security feature warns users about malicious websites?
    a) Safe Browsing
    b) Bookmark
    c) History
    d) Cache
    Answer: a) Safe Browsing

  8. Which of the following viruses is often spread via email attachments?
    a) Email virus
    b) Trojan
    c) Worm
    d) Spyware
    Answer: a) Email virus

  9. Malware that encrypts files and demands ransom is called:
    a) Ransomware
    b) Trojan
    c) Worm
    d) Spyware
    Answer: a) Ransomware

  10. Which of these is a free malware removal tool?
    a) Malwarebytes
    b) Chrome
    c) Firefox
    d) Edge
    Answer: a) Malwarebytes

  11. Which browser feature prevents tracking by websites?
    a) Do Not Track
    b) Bookmark
    c) History
    d) Cache
    Answer: a) Do Not Track

  12. Malware that spreads through USB drives is called:
    a) Autorun virus
    b) Trojan
    c) Spyware
    d) Adware
    Answer: a) Autorun virus

  13. A virus that activates at a specific date or time is called:
    a) Logic bomb
    b) Worm
    c) Trojan
    d) Spyware
    Answer: a) Logic bomb

  14. Malware that secretly collects information about a user is called:
    a) Spyware
    b) Trojan
    c) Worm
    d) Keylogger
    Answer: a) Spyware

  15. Which of the following is a browser extension that protects against malicious websites?
    a) Antivirus plugin
    b) Cache
    c) Cookie
    d) History
    Answer: a) Antivirus plugin

  16. Malware that infects the system boot sector is called:
    a) Boot sector virus
    b) Trojan
    c) Worm
    d) Adware
    Answer: a) Boot sector virus

  17. Which of these browser settings enhances online security by clearing data after each session?
    a) Clear browsing data on exit
    b) Enable pop-ups
    c) Save passwords
    d) Bookmark all pages
    Answer: a) Clear browsing data on exit

  18. Malware disguised as legitimate antivirus software is called:
    a) Rogue security software
    b) Trojan
    c) Worm
    d) Keylogger
    Answer: a) Rogue security software

  19. Which type of malware replicates itself and spreads to other computers?
    a) Worm
    b) Trojan
    c) Spyware
    d) Adware
    Answer: a) Worm

  1. Which of these protects a computer from unauthorized network access?
    a) Firewall
    b) Cache
    c) Cookie
    d) History
    Answer: a) Firewall

  2. Malware that installs additional malicious programs without user consent is called:
    a) Downloader
    b) Trojan
    c) Worm
    d) Spyware
    Answer: a) Downloader

  3. Which type of malware tricks users into clicking links to steal personal information?
    a) Phishing
    b) Worm
    c) Trojan
    d) Spyware
    Answer: a) Phishing

  4. Which browser feature blocks scripts from running on suspicious websites?
    a) Script blocker
    b) Bookmark
    c) Cache
    d) History
    Answer: a) Script blocker

  5. Malware that changes system settings to disrupt operation is called:
    a) Virus
    b) Worm
    c) Trojan
    d) Spyware
    Answer: a) Virus

  6. Which of the following protects browsers against malicious downloads?
    a) Download scanner
    b) Cache
    c) Cookie
    d) History
    Answer: a) Download scanner

  7. Malware that secretly mines cryptocurrency on your computer is called:
    a) Cryptojacker
    b) Trojan
    c) Worm
    d) Spyware
    Answer: a) Cryptojacker

  8. Malware that locks screens or devices until a ransom is paid is called:
    a) Ransomware
    b) Trojan
    c) Worm
    d) Adware
    Answer: a) Ransomware

  9. Malware that automatically sends itself to contacts in email is called:
    a) Email worm
    b) Trojan
    c) Spyware
    d) Adware
    Answer: a) Email worm

  10. Which browser feature warns about unsafe downloads or files?
    a) Security warnings
    b) Cache
    c) Bookmark
    d) History
    Answer: a) Security warnings

  11. Malware that monitors online activity for sensitive data is called:
    a) Spyware
    b) Worm
    c) Trojan
    d) Adware
    Answer: a) Spyware

  12. Which type of virus modifies system files to remain undetectable?
    a) Polymorphic virus
    b) Trojan
    c) Worm
    d) Keylogger
    Answer: a) Polymorphic virus

  13. Malware that displays fake system alerts to scare users is called:
    a) Scareware
    b) Trojan
    c) Worm
    d) Adware
    Answer: a) Scareware

  14. Which of these browser settings enhances privacy while browsing?
    a) Private/Incognito mode
    b) Enable pop-ups
    c) Save passwords
    d) Allow cookies
    Answer: a) Private/Incognito mode

  15. Malware that logs network traffic to steal information is called:
    a) Packet sniffer
    b) Worm
    c) Trojan
    d) Keylogger
    Answer: a) Packet sniffer

  16. Malware that activates when a specific condition is met is called:
    a) Logic bomb
    b) Trojan
    c) Worm
    d) Spyware
    Answer: a) Logic bomb

  17. Which of these browser features blocks access to known phishing websites?
    a) Anti-phishing filter
    b) Cache
    c) Bookmark
    d) History
    Answer: a) Anti-phishing filter

  18. Malware that changes the homepage or search engine of a browser is called:
    a) Browser hijacker
    b) Trojan
    c) Worm
    d) Spyware
    Answer: a) Browser hijacker

  19. Malware that secretly installs ads or toolbars without permission is called:
    a) Adware
    b) Worm
    c) Trojan
    d) Keylogger
    Answer: a) Adware

  20. Malware that exploits vulnerabilities in software to spread is called:
    a) Exploit
    b) Worm
    c) Trojan
    d) Spyware
    Answer: a) Exploit

    1. Which browser feature blocks tracking scripts from collecting data?
      a) Do Not Track
      b) Cache
      c) Bookmark
      d) History
      Answer: a) Do Not Track

    2. Which of the following browsers is known for strong privacy features by default?
      a) Brave
      b) Chrome
      c) Edge
      d) Internet Explorer
      Answer: a) Brave

    3. Which browser feature prevents automatic downloads from unsafe sites?
      a) Download protection
      b) Bookmark
      c) Cache
      d) History
      Answer: a) Download protection

    4. Which of these browsers allows users to manage site permissions (camera, microphone, location)?
      a) Chrome
      b) Firefox
      c) Safari
      d) All of the above
      Answer: d) All of the above

    5. Which browser feature removes tracking cookies and browsing history after closing the browser?
      a) Private browsing / Incognito mode
      b) Cache
      c) Bookmark
      d) Autofill
      Answer: a) Private browsing / Incognito mode

    6. Which type of virus can infect both files and the boot sector?
      a) Hybrid virus
      b) Trojan
      c) Worm
      d) Adware
      Answer: a) Hybrid virus

    7. Which of these is an online security measure to prevent identity theft?
      a) Two-factor authentication
      b) Cache
      c) Bookmark
      d) History
      Answer: a) Two-factor authentication

    8. Which browser feature warns about entering passwords on insecure (non-HTTPS) websites?
      a) Security warning
      b) Cache
      c) Bookmark
      d) History
      Answer: a) Security warning

    9. Which type of malware pretends to be legitimate software but performs malicious activities?
      a) Trojan
      b) Worm
      c) Adware
      d) Keylogger
      Answer: a) Trojan

    10. Which browser feature automatically fills forms and passwords securely?
      a) Autofill / Password manager
      b) Cache
      c) Bookmark
      d) History
      Answer: a) Autofill / Password manager

    11. Malware that self-replicates and spreads over the internet without user action is called:
      a) Worm
      b) Trojan
      c) Spyware
      d) Adware
      Answer: a) Worm

    12. Which of the following is a recommended practice to prevent malware infection?
      a) Regularly update software
      b) Use outdated software
      c) Disable antivirus
      d) Click unknown links
      Answer: a) Regularly update software

    13. Malware that hijacks system resources to mine cryptocurrency secretly is called:
      a) Cryptojacker
      b) Trojan
      c) Worm
      d) Adware
      Answer: a) Cryptojacker

    14. Which browser security feature checks website certificates for authenticity?
      a) SSL/TLS validation
      b) Cache
      c) Bookmark
      d) History
      Answer: a) SSL/TLS validation

    15. Which of the following viruses can remain dormant until activated by a specific action?
      a) Logic bomb
      b) Trojan
      c) Worm
      d) Adware
      Answer: a) Logic bomb

    16. Malware that collects sensitive information such as banking details is called:
      a) Spyware
      b) Trojan
      c) Worm
      d) Adware
      Answer: a) Spyware

    17. Which of the following prevents websites from tracking user activities across the web?
      a) VPN (Virtual Private Network)
      b) Cache
      c) Bookmark
      d) History
      Answer: a) VPN (Virtual Private Network)

    18. Which browser security measure blocks malicious scripts from running automatically?
      a) Script blocker
      b) Cache
      c) Bookmark
      d) History
      Answer: a) Script blocker

    19. Malware that redirects browsers to unwanted websites is called:
      a) Browser hijacker
      b) Trojan
      c) Worm
      d) Spyware
      Answer: a) Browser hijacker

    20. Which of these practices improves safe browsing on the Internet?
      a) Avoid clicking unknown links
      b) Open unknown email attachments
      c) Disable antivirus
      d) Use outdated browsers
      Answer: a) Avoid clicking unknown links

      1. Malware that records user actions on a device is called:
        a) Keylogger
        b) Trojan
        c) Worm
        d) Adware
        Answer: a) Keylogger

      2. Which of the following browsers has built-in phishing and malware protection?
        a) Chrome
        b) Internet Explorer
        c) Safari
        d) Opera
        Answer: a) Chrome

      3. Which of these protects a computer from unauthorized access over a network?
        a) Firewall
        b) Cache
        c) Cookie
        d) History
        Answer: a) Firewall

      4. Malware that disguises itself as a useful program but steals information is called:
        a) Trojan
        b) Worm
        c) Spyware
        d) Adware
        Answer: a) Trojan

      5. Which of these browser settings increases security by not saving passwords automatically?
        a) Disable password saving
        b) Enable autofill
        c) Enable cookies
        d) Enable pop-ups
        Answer: a) Disable password saving

      6. Malware that spreads via infected email attachments is called:
        a) Email virus
        b) Trojan
        c) Worm
        d) Spyware
        Answer: a) Email virus

      7. Which of these practices prevents browser hijacking?
        a) Avoid installing unknown extensions
        b) Click all pop-ups
        c) Download from unknown sources
        d) Disable antivirus
        Answer: a) Avoid installing unknown extensions

      8. Malware that encrypts files and demands payment to decrypt is called:
        a) Ransomware
        b) Trojan
        c) Worm
        d) Adware
        Answer: a) Ransomware

      9. Which browser feature allows viewing website content without storing history?
        a) Incognito / Private mode
        b) Cache
        c) Bookmark
        d) History
        Answer: a) Incognito / Private mode

      10. Malware that silently collects personal data without the user’s consent is called:
        a) Spyware
        b) Worm
        c) Trojan
        d) Adware
        Answer: a) Spyware

      11. Which of the following is recommended to prevent malware infection?
        a) Keep operating system and browsers updated
        b) Disable antivirus
        c) Click unknown links
        d) Use outdated software
        Answer: a) Keep operating system and browsers updated

      12. Malware that shows fake alerts to scare users into buying software is called:
        a) Scareware
        b) Trojan
        c) Worm
        d) Spyware
        Answer: a) Scareware

      13. Which browser feature protects against visiting fake websites?
        a) Anti-phishing filter
        b) Cache
        c) Bookmark
        d) History
        Answer: a) Anti-phishing filter

      14. Malware that spreads via removable drives like USB sticks is called:
        a) Autorun virus
        b) Trojan
        c) Worm
        d) Spyware
        Answer: a) Autorun virus

      15. Which of these improves online privacy while browsing?
        a) Use VPN
        b) Enable cookies for all sites
        c) Save passwords on all sites
        d) Disable antivirus
        Answer: a) Use VPN

      16. Malware that changes browser settings to redirect searches is called:
        a) Browser hijacker
        b) Trojan
        c) Worm
        d) Adware
        Answer: a) Browser hijacker

      17. Which type of malware exploits software vulnerabilities to gain control of a system?
        a) Exploit
        b) Worm
        c) Trojan
        d) Spyware
        Answer: a) Exploit

      18. Malware that secretly mines cryptocurrency using your computer resources is called:
        a) Cryptojacker
        b) Trojan
        c) Worm
        d) Spyware
        Answer: a) Cryptojacker

      19. Which browser security feature blocks harmful scripts from running on a webpage?
        a) Script blocker
        b) Cache
        c) Bookmark
        d) History
        Answer: a) Script blocker

      20. The safest practice to avoid viruses while browsing is:
        a) Avoid visiting unknown or suspicious websites
        b) Download unknown files
        c) Click on pop-ups
        d) Disable firewall
        Answer: a) Avoid visiting unknown or suspicious websites

Leave a Comment

Your email address will not be published. Required fields are marked *

You cannot copy content of this page

Scroll to Top