Chapter 12: Cyber Security, Malware, and Protection Tools (Set-2)
In cyber security, what term describes anything valuable that must be protected, like files, accounts, or devices?
A Asset
B Firewall
C Attack vector
D Trojan
An asset is anything important to protect, such as data, user accounts, computers, or networks. Identifying assets helps decide what security controls are needed and which risks are most serious.
A “threat” in cyber security is best described as
A Software update
B Backup routine
C Possible harmful event
D Password hint
A threat is anything that could cause harm, such as hackers, malware, or insider misuse. Threats become dangerous when they exploit vulnerabilities, leading to data loss or system disruption.
Which term means “the result or impact if an attack succeeds,” such as money loss or service downtime?
A Cookie
B Impact
C Signature
D Passphrase
Impact refers to the damage caused by a successful security incident, like financial loss, privacy harm, or downtime. Risk evaluation considers both likelihood of attack and impact if it happens.
An example of “unauthorized access” is
A Installing antivirus
B Updating Windows
C Logging in without permission
D Encrypting a drive
Unauthorized access means entering a system or account without valid permission. It may happen through stolen passwords, weak security settings, or exploited vulnerabilities, and can lead to theft or changes in data.
Someone breaks into a system mainly to learn how it works, not to steal. This activity is still generally called
A Formatting
B Hacking
C Imaging
D Streaming
Hacking means trying to access or manipulate systems, often without permission. Even if the goal is curiosity, unauthorized access is risky and illegal in many cases, and must be reported properly.
A scam email or message tricks users into entering bank login details on a fake website. What is this cybercrime called?
A Phishing scam
B Disk cleanup
C File syncing
D Screen sharing
Phishing tricks users into giving passwords or OTPs by using fake messages and websites. The attacker often copies trusted designs to look real, so careful checking and verification are important.
In an organization, the best purpose of “incident reporting” is to
A Delete old emails
B Increase Wi-Fi range
C Improve screen quality
D Start quick response
Incident reporting ensures the security team can act quickly to contain damage, isolate systems, and reset compromised accounts. Early reporting reduces spread of malware and limits data exposure.
A cyber “attack surface” refers to
A Only antivirus files
B Only Wi-Fi speed
C All possible entry points
D Only backup drives
The attack surface includes all ways attackers might enter, like weak passwords, open ports, outdated apps, and unsafe USB use. Reducing the attack surface lowers overall security risk.
A common “hacking basics” technique used to guess passwords repeatedly is called
A Screen lock
B Brute force
C Data masking
D Sandboxing
Brute-force attacks try many password combinations until one works. Strong, long passwords and account lockout rules reduce success. Two-factor authentication also protects even if a password is guessed.
A “security control” is best described as
A Virus file
B Keyboard layout
C Protection measure
D Video format
A security control is a safeguard like antivirus, firewall rules, access permissions, or training. Controls reduce risk by preventing attacks, detecting threats early, or minimizing damage after an incident.
Which type of malware often spreads by attaching itself to email attachments and running when opened?
A Virus
B Router
C Cookie
D Patch
A virus commonly attaches to files and spreads when users open or run the infected file. Email attachments are a common method, so scanning attachments and avoiding unknown senders helps prevent infection.
A worm outbreak in a network is often faster because a worm can
A Only run offline
B Spread without user action
C Need password managers
D Require manual install
Worms self-spread across networks by using vulnerabilities, without needing a user to open a file. Keeping systems updated and using firewalls reduces the chance of worms spreading quickly.
A trojan may create a “backdoor,” which means
A Extra RAM space
B Faster browser load
C Temporary file folder
D Hidden access path
A backdoor is a hidden method to access a system without normal authentication. Trojans may install backdoors for remote control, data theft, or to download additional malware later.
Ransomware commonly harms users by
A Cleaning temporary files
B Updating drivers
C Encrypting personal files
D Fixing broken links
Ransomware encrypts or locks files and demands payment. Backups stored safely, updated security patches, and careful handling of downloads and attachments are key to prevention and recovery.
Spyware is especially dangerous because it can
A Increase battery life
B Steal private information
C Improve Wi-Fi signal
D Reduce file size
Spyware collects data like logins, browsing activity, or personal details without permission. It may run silently for a long time, so regular scans and cautious installs help protect privacy.
Keyloggers mainly try to capture
A Screen resolution
B Printer settings
C Passwords and OTPs
D Battery temperature
Keyloggers record keystrokes to steal credentials such as passwords, PINs, and even OTPs typed on a keyboard. Strong security tools and 2FA reduce damage from stolen passwords.
Adware usually causes which problem on a computer?
A Unwanted advertisements
B Faster boot time
C Better graphics
D More storage space
Adware shows intrusive ads and may track browsing for profit. It often comes bundled with free software. Installing from trusted sources and reading install screens carefully reduces adware risks.
A botnet is commonly used to perform
A File compression
B DDoS attacks
C Disk formatting
D Screen recording
Botnets can control many infected devices to flood a website or service with traffic, causing denial of service. Protecting devices from malware prevents them from being used in attacks.
Rootkits are hard to remove mainly because they
A Only show popups
B Never use internet
C Hide inside system
D Only affect printers
Rootkits embed deeply and try to hide malicious activity by modifying system functions. They can give long-term control to attackers, so using trusted scans and secure boot tools is important.
A common “infection method” for malware is
A Lower screen brightness
B Extra RAM installed
C Wallpaper change
D Pirated software download
Pirated or cracked software is a common malware source because it may contain hidden trojans or spyware. Downloading only from official sources and keeping security tools active reduces this risk.
Antivirus “full scan” usually checks
A Only browser history
B Entire system files
C Only keyboard drivers
D Only screen settings
A full scan checks many files, folders, and system areas for threats. It may take longer but can detect infections that quick scans miss, especially on systems used for many downloads.
A “quick scan” typically focuses on
A Only external USB
B Only cloud accounts
C Common malware locations
D Only audio drivers
Quick scans check areas where malware commonly hides, like startup items and system folders. They are faster than full scans and useful for regular checks, but full scans are still needed sometimes.
Which feature helps stop known malicious files immediately when downloaded?
A Real-time scanning
B Disk defrag
C Sleep mode
D File renaming
Real-time scanning checks files as they are opened or downloaded and blocks threats quickly. It reduces the chance of infection before malware runs, especially when users browse and download often.
“Quarantine” is used mainly to
A Speed up computer
B Isolate suspicious items
C Create backup images
D Increase internet range
Quarantine prevents suspicious files from running by storing them safely. This gives time to decide whether to delete or restore them, and helps stop malware from harming the system.
Heuristic detection is helpful when malware is
A Always offline
B Only in videos
C Only in printers
D New or modified
Heuristic detection looks for suspicious behavior patterns rather than exact signatures. This helps catch new threats that are not yet in signature databases, improving protection against emerging malware.
A firewall rule that blocks unknown inbound connections improves
A Screen resolution
B File compression
C Network security
D Battery charging
Blocking unknown inbound connections reduces the chance of remote attacks and unauthorized access. Firewalls act as a gatekeeper by allowing trusted traffic and limiting risky network paths into a device.
Anti-spyware tools are designed mainly to detect
A Hardware dust
B Tracking and spying malware
C Broken pixels
D Old documents
Anti-spyware focuses on malware that monitors behavior and steals information, such as spyware and keyloggers. Keeping these tools updated helps protect privacy and prevent credential theft.
Anti-ransomware protection mainly tries to
A Improve Wi-Fi strength
B Increase storage size
C Stop file encryption attack
D Hide desktop icons
Anti-ransomware tools detect suspicious encryption behavior and block it early. Combined with backups and safe browsing, they reduce chances of losing important files to ransomware.
Security updates should be installed quickly because they
A Fix known vulnerabilities
B Increase screen size
C Add more RAM
D Change keyboard style
Updates and patches close security holes that attackers use. Delaying updates gives attackers time to exploit known weaknesses, especially when exploit details become widely available online.
A “system cleanup tool” is most useful after malware removal to
A Increase password length
B Remove leftover junk
C Create phishing emails
D Disable firewall rules
Cleanup tools can remove temporary files and leftover traces that may slow the system. They do not replace antivirus, but they help restore normal performance after scans and malware removal steps.
The best example of a “weak password” is
A G!7pL#9xQ@1
B Long word string
C 123456
D Unique random phrase
Very common passwords like 123456 are easy to guess and often appear in leaked password lists. Strong passwords should be longer, unique per account, and not based on common patterns.
A password manager improves security most by reducing
A Screen brightness
B Email storage
C Wi-Fi bandwidth
D Password reuse
Password reuse is dangerous because one leak can unlock multiple accounts. Password managers help generate and store unique passwords for each service, reducing the damage from any single breach.
For high security, 2FA using an authenticator app is generally better than
A Long passwords
B SMS OTP only
C Device lock
D Antivirus scans
Authenticator apps are often safer than SMS OTP because SMS can be intercepted through SIM swap or message forwarding. Still, any 2FA is better than none for account protection.
A safe habit for account recovery is to
A Update recovery email
B Share OTP with friends
C Use same PIN everywhere
D Disable login alerts
Keeping recovery email and phone number updated helps regain access after password loss or attack. Login alerts also help detect suspicious activity early, allowing quick action to secure the account.
When downloading software, the safest choice is usually
A Random chat link
B Unknown file hosting
C Official vendor website
D Popup download button
Official sources reduce the chance of bundled malware and fake installers. Always verify the website address, avoid “cracked” tools, and scan downloads using updated antivirus before installing.
A safe browsing step before clicking a link is to
A Disable browser security
B Hover to preview URL
C Turn off updates
D Save passwords publicly
Hovering over links shows the real destination. This helps detect fake links that look real in text. Always check for misspellings, strange domains, and unexpected shortened URLs.
A secure Wi-Fi practice is to change the router’s
A Wallpaper theme
B Screen timeout
C Default admin password
D Desktop icon size
Default router admin passwords are commonly known and easy to attack. Changing them and enabling WPA2/WPA3 helps prevent unauthorized control of the router and protects devices on the network.
“Privacy settings” on apps are important mainly to control
A Data sharing permissions
B Battery charging speed
C Screen brightness limit
D Keyboard language
Privacy settings control what personal data an app can access and share, like location, contacts, and microphone. Restricting unnecessary permissions reduces tracking and lowers privacy and security risks.
A common social engineering trick is pretending to be
A Antivirus update tool
B Technical support staff
C PDF viewer
D Keyboard driver
Attackers often impersonate support staff to gain trust and ask for passwords, OTPs, or remote access. Always verify requests through official channels before sharing information or allowing access.
A phishing email often creates pressure by using
A High image quality
B Large font size
C Urgent warning message
D Short paragraphs
Many phishing emails push urgency like “account will close today” to force quick mistakes. Calmly verify the sender, check the domain, and confirm through the official site or helpline.
“Impersonation” in scams means
A Compressing a file
B Updating software
C Encrypting a drive
D Pretending to be someone
Impersonation involves acting like a trusted person or company to trick victims into sharing credentials or making payments. Use independent verification, such as calling official numbers, before acting.
A strong step to verify a suspicious payment request is to
A Reply to same email
B Call official number
C Click attached link
D Share OTP quickly
Verify using a trusted method, like calling a known official number or contacting the person through a saved contact. Do not use numbers or links provided in the suspicious message.
A safe method to check a website before login is to
A Type URL manually
B Use random search ads
C Click unknown short link
D Share your password
Typing the official URL reduces risk of landing on fake pages from phishing links. Bookmarks can also help if saved correctly. Use HTTPS and check the domain carefully before entering passwords.
Cookies in browsers are mainly used to
A Remove malware
B Speed up CPU
C Store site session info
D Encrypt hard drives
Cookies store small pieces of data like login sessions and preferences. Controlling cookies improves privacy because some cookies track behavior across sites. Clear cookies or block third-party tracking when needed.
Ad tracking can be reduced by
A Sharing passwords publicly
B Limiting third-party cookies
C Disabling all updates
D Turning off firewall
Third-party cookies and trackers follow browsing activity across different websites. Limiting them in browser settings reduces tracking. Using privacy-focused settings and reviewing app permissions also helps.
Secure disposal of data on an old laptop best includes
A Just delete files
B Rename folders
C Move to desktop
D Wipe drive securely
Deleting files often leaves recoverable data. Secure wiping or full disk erase reduces recovery chances. For sensitive data, encryption plus secure wipe gives stronger protection before selling or discarding devices.
Safe USB use helps because unknown USB drives may contain
A Screen saver
B Audio plugin
C Malware payload
D Printer driver
Unknown USB drives can carry malware that runs automatically or tricks users into opening infected files. Avoid using unknown drives, disable auto-run, and scan removable media before opening files.
A “digital footprint” means
A Hard disk scratches
B Your online activity traces
C CPU temperature
D Printer ink levels
A digital footprint is the data trail you leave online, such as posts, searches, and account history. Limiting oversharing, adjusting privacy settings, and using strong security helps protect reputation and privacy.
Basic encryption is used mainly to
A Make data unreadable
B Increase file size
C Speed up internet
D Remove advertisements
Encryption converts readable data into a coded form that needs a key to read. It protects data privacy during storage or transfer, especially on public networks and when devices are lost.
After detecting a suspected phishing message in a company, the best action is to
A Forward to all coworkers
B Click link to check
C Report via official channel
D Reply with password
Reporting through the official channel helps security teams warn others, block malicious domains, and investigate. Forwarding widely can spread risk. Never click suspicious links or share OTPs or passwords.