Chapter 12: Cyber Security, Malware, and Protection Tools (Set-4)

A security officer asks employees to report any suspicious email within 10 minutes using a fixed form. This practice mainly strengthens

A Screen lock timing
B File compression method
C Keyboard shortcut use
D Incident reporting process

An attacker studies an organization’s public website to find exposed email addresses and uses them for scams. This activity is best called

A Encryption
B Reconnaissance
C Disk defragmentation
D Data archiving

A company reduces attack chances by closing unused ports and removing unnecessary services. This action mainly reduces the

A Password length
B Disk capacity
C Attack surface
D Screen timeout

A single email account shows many repeated login attempts in a short time, trying different passwords. Which attack is most likely?

A Brute-force attack
B Password spraying
C Disk cleaning
D Driver update

A cyber threat that tricks users into installing fake security software is best described as

A Firmware
B Freeware
C Scareware
D Clipboard tool

A user downloads a “game mod” that looks safe but silently installs spyware. Which user mistake is most related?

A Strong password use
B Regular backup practice
C Screen lock setting
D Untrusted download habit

A program secretly changes browser settings and redirects searches. This is often a sign of

A File compressor
B Browser hijacker
C System driver
D Printer manager

A “zero-day vulnerability” is dangerous mainly because

A Password is short
B Wi-Fi is slow
C No patch exists
D Screen is cracked

A “security baseline” in an organization usually means

A Maximum RAM speed
B Highest screen quality
C Largest disk size
D Minimum secure settings

A Trojan that pretends to be an invoice and spreads via email attachment is mainly relying on

A CPU overheating
B Social engineering
C Disk fragmentation
D File indexing

“Fileless malware” is harder to detect because it mainly

A Needs a printer
B Uses only USB
C Runs in memory
D Avoids internet always

A common method used by ransomware to spread inside a company network is

A Screen brightness
B Shared folder access
C Audio driver update
D Keyboard layout

A “command and control” server is used mainly to

A Store family photos
B Increase Wi-Fi range
C Encrypt backups
D Control infected devices

Spyware that records screenshots and browsing history is mainly violating

A CPU performance
B Screen resolution
C User privacy
D Disk formatting

A rootkit often requires stronger cleanup steps because it may

A Modify system core
B Only show ads
C Use only SMS
D Affect only photos

A key reason antivirus uses “heuristics” is to detect malware that

A Is always harmless
B Needs no internet
C Is only old
D Has no signature yet

If antivirus “quarantines” a file, the file is

A Uploaded to social media
B Prevented from running
C Sent to printer queue
D Made into a backup

A firewall that allows only approved applications to access the internet is using

A Screen lock policy
B Disk cleanup rule
C Application control
D Password hashing

Why is “real-time protection” important even if you run weekly scans?

A Stops threats instantly
B Deletes backups always
C Disables browser cookies
D Increases disk space

A safe computing rule says “do not use admin account for daily browsing.” This reduces risk because

A Increases screen quality
B Speeds up internet
C Adds storage space
D Limits malware privileges

A password like “R0hit@2026!” is still weak mainly because it

A Has symbols included
B Is hard to type
C Uses predictable pattern
D Is mixed case

“Password hashing” is important because it

A Deletes phishing emails
B Protects stored passwords
C Blocks all malware
D Improves Wi-Fi speed

Two-factor authentication is weaker if the second factor is

A App-generated code
B Hardware security key
C Biometric on phone
D Shared OTP by SMS

A common safe browsing habit to avoid fake login pages is to

A Click ads first
B Trust every email
C Use saved bookmarks
D Disable HTTPS

“Secure downloads” best means

A Verify file source
B Turn off antivirus
C Ignore warnings
D Use random mirrors

A user saves passwords in a plain text file on desktop. The biggest risk is

A Faster login speed
B Easy password theft
C Better screen look
D More disk space

Social engineering works best when attackers create

A Slow internet speed
B High screen brightness
C Extra RAM usage
D Trust and urgency

A “spear phishing” email is different because it is

A Sent to everyone
B Always harmless
C Targeted to one person
D Only on SMS

A company asks employees to verify payment requests by calling the requester on a known number. This prevents

A Disk fragmentation
B Business email compromise
C Screen flicker
D File corruption

A “smishing” message often contains

A Printer driver update
B Safe website bookmark
C Verified certificate only
D Short link to click

A “vishing” scam is usually performed through

A Email attachment
B Website popup
C Phone call voice
D USB drive

A spoofed website can be detected by checking the

A Domain spelling carefully
B Background color
C Font type used
D Page loading speed

A QR code posted on a random pole asks for “KYC update” and opens a payment page. This is likely a

A Disk restore tool
B Antivirus update
C Backup service
D QR phishing scam

“Data minimization” supports privacy by

A Sharing data widely
B Collecting only necessary
C Storing forever always
D Disabling encryption

A strong step to protect sensitive files on a laptop is to enable

A Screen wallpaper lock
B Auto-play music
C Full disk encryption
D Quick file rename

In incident response, “containment” mainly means

A Increase internet speed
B Create new accounts
C Print security policy
D Stop threat spreading

The best immediate action after a confirmed data breach is to

A Hide it silently
B Follow incident plan
C Delete all logs
D Share publicly first

Security logs are valuable because they

A Increase battery life
B Improve screen size
C Show event history
D Delete malware fully

“Patch management” is important because it helps

A Increase file compression
B Improve printer speed
C Reduce screen glare
D Apply updates on time

A “secure browsing” indicator in the address bar commonly includes

A High brightness icon
B HTTPS padlock
C Volume icon
D Battery icon

Cookies can be risky for privacy mainly because they can

A Track user behavior
B Increase monitor size
C Delete files automatically
D Improve Wi-Fi speed

A “secure disposal” step for a hard drive in an office is to

A Just delete files
B Rename folders
C Move to desktop
D Use certified wiping

A user plugs an unknown USB drive found in a parking area. The biggest risk is

A Faster file copy
B Malware infection
C Better sound quality
D More storage space

A “digital footprint” is increased most when a person

A Uses 2FA daily
B Updates antivirus
C Shares location publicly
D Locks device screen

A “data breach notification” is required in many places to

A Boost internet speed
B Increase storage size
C Improve screen quality
D Inform affected users

A common protection against credential theft on public Wi-Fi is to use

A Same weak password
B Open hotspot always
C VPN or HTTPS
D Disable screen lock

A computer shows high CPU usage and unknown processes, and antivirus alerts appear. What is a sensible first troubleshooting step?

A Ignore and continue
B Disconnect and scan
C Share files publicly
D Disable security tools

An “awareness cue” in phishing is often

A Mismatched sender domain
B Correct bank URL
C Expected attachment
D Known phone number

A good “malware removal” sequence generally starts with

A Share infected files
B Increase brightness
C Rename all files
D Isolate the device

A basic rule for cyber laws awareness in workplaces is

A Use any pirated apps
B Do not share data
C Ignore user privacy
D Hide all incidents

Leave a Reply

Your email address will not be published. Required fields are marked *