Chapter 12: Cyber Security, Malware, and Protection Tools (Set-3)

A security team lists “customer database, admin accounts, payment system” and then decides which needs strongest protection first. What step are they doing?

A File compression
B Asset classification
C Screen calibration
D Printer sharing

An attacker looks for outdated software because it is easier to exploit. In security terms, outdated software increases the system’s

A Vulnerability level
B Screen resolution
C Power efficiency
D Storage quota

A company evaluates “likelihood of attack” and “damage if it happens” to decide protection priority. This is mainly called

A Data entry
B Disk formatting
C Risk assessment
D Packet switching

A user receives login alerts from an unknown country and quickly changes password and enables 2FA. Which security goal is mainly achieved?

A File encryption
B Network routing
C Hardware upgrade
D Account protection

A security policy says “use least privilege for all employees.” What does “least privilege” mean?

A Fastest internet plan
B Maximum storage space
C Minimum required access
D Strongest screen lock

A cybercriminal demands money to stop leaking stolen photos. This crime is best described as

A Cyber extortion
B Data backup
C File indexing
D Secure browsing

A hacker changes a website’s displayed content without permission. Which cybercrime term fits best?

A Disk cleanup
B Safe mode boot
C Website defacement
D Key generation

A “data breach” is most directly caused when

A Confidential data exposed
B Monitor brightness changes
C RAM usage increases
D Keyboard language changes

A user installs a “free PDF converter” that secretly steals browser passwords. This is most likely

A Router firmware
B Trojan software
C Screen recorder
D Antivirus update

A worm spreads using a network flaw and then installs more malware. The “installs more malware” part is best called

A Screen refresh
B Cache clearing
C File naming
D Payload action

A “logic bomb” activates when a certain condition is met, like a specific date. Which category does it belong to?

A Network device
B Backup method
C Malware type
D Password policy

A program that secretly gives remote control access to an attacker is commonly called

A Backdoor malware
B Screen driver
C Disk partition
D File converter

Which symptom most strongly suggests ransomware on a computer?

A Battery drains faster
B Mouse feels slow
C Files show strange extensions
D Printer stops working

A keylogger is most dangerous for users of

A Offline calculator
B Online banking
C Local wallpaper
D Text editor only

A botnet-controlled device is often called a

A Zombie computer
B Master server
C Backup node
D Safe sandbox

A rootkit is often discovered late because it mainly focuses on

A Showing popup ads
B Compressing video files
C Hiding malicious activity
D Cleaning temp folders

Antivirus “false positive” means

A Virus ignored
B Firewall disabled
C Backup corrupted
D Safe file flagged

Antivirus “false negative” means

A Malware not detected
B Safe file flagged
C Scan runs faster
D Update fails always

Why is “regular signature update” important for antivirus accuracy?

A Improves screen quality
B Reduces battery use
C Adds new malware patterns
D Increases keyboard speed

A firewall that blocks outgoing connections from unknown apps helps prevent

A Screen flicker
B Data exfiltration
C Printer jam
D Low storage

“Quarantine” helps security teams because it

A Speeds up downloads
B Changes passwords
C Stops file execution
D Encrypts backups

A sandbox is useful when checking a suspicious file because it

A Boosts Wi-Fi signal
B Clears browser history
C Extends battery life
D Limits system damage

A “scheduled scan” is especially useful for

A Regular unattended checks
B Increasing RAM size
C Changing file formats
D Hiding desktop icons

A strong password policy that requires unique passwords for all systems mainly reduces

A Screen lock delay
B Print speed loss
C Credential stuffing risk
D Battery overheating

A passphrase like “BlueRiver$Morning!2026” is strong mainly because it is

A Short and common
B Long and mixed
C Based on birthday
D Same for all

Two-factor authentication improves security even if a password is stolen because it requires

A More screen brightness
B Extra storage space
C Second proof of identity
D Faster network speed

A secure backup strategy for ransomware should include at least one backup that is

A Offline or disconnected
B Always on same PC
C Only in recycle bin
D Shared to everyone

Safe browsing against fake websites is improved most by checking the

A Page background color
B Font size used
C Number of images
D Exact domain name

A “drive-by download” attack usually happens when

A Restarting your computer
B Updating your antivirus
C Visiting infected website
D Using strong passwords

A typical sign of social engineering in a message is

A Correct company domain
B Urgent pressure to act
C Clear contact details
D No links included

Smishing is most likely received through

A Bluetooth transfer
B Printer queue
C SMS text message
D Screen notification only

Vishing attackers usually try to steal

A OTPs and passwords
B Wallpaper themes
C Screen resolution
D Printer ink levels

Email spoofing is dangerous because it can

A Increase storage size
B Fix broken links
C Look like trusted sender
D Improve antivirus speed

A “QR scam” is most dangerous when it leads to

A Better camera focus
B Faster app download
C Clearer screen image
D Fake payment page

A safe first step after clicking a suspicious link accidentally is to

A Increase screen timeout
B Disconnect from network
C Change wallpaper
D Install random tools

When removing malware, why is restarting into safe mode sometimes recommended?

A Wi-Fi becomes stronger
B Screen becomes brighter
C Malware runs less
D RAM becomes larger

A “security patch” is best described as

A Fix for software flaw
B Backup file copy
C New mouse device
D Internet speed booster

Encryption supports privacy because it

A Speeds up downloads
B Removes malware fully
C Protects readable data
D Deletes old cookies

HTTPS mainly helps users by protecting

A Printer connection
B Screen brightness
C File naming style
D Data in transit

A company restricts USB use and blocks auto-run features. This mainly reduces risk from

A Infected removable media
B Slow internet speed
C Weak screen colors
D High CPU temperature

Browser privacy improves when you block

A Screen notifications
B Third-party trackers
C Keyboard shortcuts
D Printer drivers

Secure disposal of a smartphone before sale should include

A Rename all folders
B Only uninstall apps
C Factory reset plus wipe
D Just delete photos

A “digital footprint” can harm privacy if you

A Share too much online
B Use a long password
C Enable 2FA
D Update your OS

A user receives a suspicious email. Which verification step is safest?

A Reply asking details
B Open attachment first
C Use official website login
D Click link quickly

An organization practices “incident response.” What is a key goal of incident response?

A Increase internet speed
B Install new printers
C Create user accounts
D Contain and recover

A “security log” is most useful for

A Improving screen clarity
B Investigating an incident
C Faster file copying
D Changing keyboard language

A “data privacy” rule focuses mainly on

A Faster CPU processing
B Better video playback
C Proper personal data use
D Higher monitor refresh

Awareness training reduces cyber risk mainly because it helps users

A Recognize common scams
B Add more RAM
C Increase typing speed
D Change screen theme

A “security policy violation” example is

A Locking screen when away
B Using password manager
C Sharing passwords with coworker
D Reporting phishing email

A layered security approach is best described as

A Only antivirus installed
B Only strong passwords
C Only firewall enabled
D Multiple defenses together

Leave a Reply

Your email address will not be published. Required fields are marked *