Chapter 12: Cyber Security, Malware, and Protection Tools (Set-5)

A company uses the same admin password on many routers. Which risk becomes most serious if one password leaks?

A Screen burn-in
B Disk defrag need
C Lateral movement
D Font size issue

An attacker tries one common password on many user accounts instead of many passwords on one account. What is this called?

A Brute forcing
B Password spraying
C Disk wiping
D Port scanning

A security team blocks inbound ports but allows any program to send data out. What major risk still remains?

A Data exfiltration
B Screen flicker
C Fan noise
D File naming

A phishing email uses a real company logo and correct formatting, but the link domain is slightly different. Which check exposes the scam best?

A Font checking
B Image quality
C Domain verification
D Email length

A malware sample changes its code slightly each time to avoid signatures. What technique is this?

A Sandboxing
B Hashing
C Quarantine
D Polymorphism

A user enables macros in an unknown document and a hidden script installs malware. Which control would reduce this risk most?

A Macro restrictions
B Higher brightness
C Bigger storage
D Faster mouse

A ransomware attack encrypts shared folders across a network. Which control best limits the damage?

A Screen lock
B Keyboard layout
C Least privilege
D Wallpaper change

A security team needs to know “what happened, when, and from where” after an incident. Which data source helps most?

A System logs
B Screen settings
C Wallpaper history
D Font library

A trojan creates a hidden remote access channel that bypasses normal login. What is the best term?

A Cookie
B Shortcut
C Cache
D Backdoor

Malware running only in memory leaves few files on disk. Which type fits best?

A Boot sector virus
B Adware bundle
C Fileless malware
D Zip bomb

A website uses HTTPS, but the domain is fake and steals logins. What is the correct statement?

A HTTPS ≠ trust
B HTTPS blocks phishing
C HTTPS deletes malware
D HTTPS stops scams

A user receives a call claiming “bank support” and asking for OTP to reverse a transaction. What attack is this?

A Smishing
B Adware
C Spoofing
D Vishing

An attacker convinces an employee to urgently change a vendor bank account using email. Which fraud is this?

A Worm attack
B BEC scam
C Keylogging
D DNS caching

A device joins a botnet. What is the attacker most likely to use it for?

A Disk cleanup
B File backup
C DDoS traffic
D Screen recording

A rootkit is particularly dangerous because it can

A Hide other malware
B Improve performance
C Expand storage
D Fix drivers

Antivirus detects a safe file as malicious and blocks it. What is this error called?

A False negative
B Data breach
C False positive
D Backdoor

Malware exists but antivirus reports “no threats found.” What is this called?

A False negative
B False positive
C Safe mode
D Quarantine

A company keeps one backup permanently connected to the same PC. During ransomware, what is the likely outcome?

A Backup becomes faster
B Backup blocks malware
C Backup stays hidden
D Backup gets encrypted

A user reuses one password across email, banking, and shopping sites. Which attack becomes easier after one leak?

A Port scanning
B Sandboxing
C Credential stuffing
D Disk cloning

A security baseline is mainly used to ensure devices have

A Maximum brightness
B Standard secure settings
C Fastest CPU speed
D Biggest disk size

A “zero-day” exploit is hardest to stop quickly because

A Patch not available
B Wi-Fi is slow
C Disk is full
D Screen is small

A suspicious attachment is opened and the computer starts contacting unknown servers. Which control helps block that communication?

A Screen lock rules
B Disk cleanup tools
C Outbound firewall rules
D Font settings

A user wants to verify a link without clicking it. Which safe step helps most?

A Increase brightness
B Change password later
C Disable antivirus
D Hover URL preview

A ransomware note demands payment in cryptocurrency. What is the best practical recovery choice if backups exist?

A Restore from backup
B Pay immediately
C Delete all files
D Ignore encryption

An employee shares OTP with “support staff” during a call. Which security failure occurred?

A Firewall misconfig
B Disk corruption
C Social engineering success
D Screen timeout

A company wants to reduce phishing impact even if passwords are stolen. Best control is

A Strong 2FA
B Bigger monitors
C More RAM
D Faster CPU

A web browser stores third-party cookies across sites. What privacy risk increases most?

A Faster downloads
B Cross-site tracking
C Better graphics
D More storage

A person sells an old laptop after deleting files only. Why is this unsafe?

A RAM may drop
B Wi-Fi may slow
C Screen may crack
D Data may recover

A fake website uses a slight spelling change like “micros0ft” instead of “microsoft.” This trick is called

A Sandboxing
B Hashing
C Typosquatting
D Quarantine

A security tool isolates suspicious programs so they cannot affect the main system. This concept is

A Sandboxing
B Spoofing
C Smishing
D Keylogging

A security team wants to reduce human error in phishing. Most effective long-term method is

A Bigger storage
B New keyboards
C Faster printers
D Awareness training

A malware spreads by exploiting a network vulnerability, not by attaching to files. Which type fits?

A Virus
B Adware
C Worm
D Trojan

A program that pretends to be antivirus but actually installs malware is

A Rogue antivirus
B Safe browser
C Disk utility
D Backup agent

A device lock with a long PIN helps most when the device is

A Fully updated
B Lost or stolen
C Charging slowly
D On airplane mode

A user receives an email with a mismatched “reply-to” address. What is the best response?

A Click to confirm
B Reply with OTP
C Open attachment
D Report as phishing

A company applies patches monthly, but critical vulnerabilities are exploited in days. What improvement helps most?

A Faster patch cycle
B Higher brightness
C More printers
D Bigger monitors

A security incident response plan should clearly define

A Screen wallpaper
B Font selection
C Roles and steps
D Keyboard layout

After malware removal, which step helps prevent re-infection through the same weakness?

A Apply security patches
B Change wallpaper
C Defrag disk
D Rename folders

A user tries to log in to a bank by clicking a link in SMS. The safest alternative is to

A Reply to SMS
B Open official app
C Share OTP first
D Click shortened link

A “payload” in malware can include which action?

A Improving battery life
B Updating drivers
C Cleaning temp files
D Encrypting user files

A company enforces “unique passwords + 2FA” and also monitors unusual logins. This combination is best described as

A Single control
B File formatting
C Layered security
D Screen tuning

A suspicious USB found in public is risky mainly due to

A Malware delivery
B Better storage
C Faster transfer
D Extra RAM

A phishing site asks for OTP immediately after password entry. What should the user do?

A Enter OTP quickly
B Refresh the page
C Try again later
D Close and report

A user installs updates only for apps, not for the operating system. What risk increases most?

A Cleaner desktop
B Faster boot time
C Unpatched OS flaws
D Better graphics

A security team isolates an infected PC from the network first. Which incident-response step is this?

A Containment
B Recovery
C Archiving
D Formatting

A company stores sensitive data. Which practice best supports “confidentiality”?

A Bigger monitors
B Encryption at rest
C Faster Wi-Fi
D More storage

A user disables antivirus because it “slows the PC” and then gets infected. Which security principle was ignored?

A Continuous protection
B Screen optimization
C File naming
D Printer sharing

A security team checks software vendors and applies urgent fixes quickly. Which process is this?

A Disk partitioning
B Video rendering
C Data labeling
D Patch management

An attacker uses a fake QR code to open a payment link. Which prevention step is best?

A Increase brightness
B Disable Wi-Fi always
C Verify URL before pay
D Turn off updates

A user’s browser shows many suspicious extensions installed without permission. Best first corrective action is to

A Remove extensions and scan
B Change wallpaper only
C Increase volume level
D Disable screen lock

Leave a Reply

Your email address will not be published. Required fields are marked *