Chapter 12: Cyber Security, Malware, and Protection Tools (Set-6)
Which term means “harmful online danger”?
A Disk space
B Screen saver
C Cyber threat
D File format
A cyber threat is any possible danger in the digital world, such as hackers, malware, or scams. Threats can harm devices, steal data, or disrupt services if security is weak.
A weakness in software that attackers can exploit is called
A Wallpaper
B Brightness
C Keyboard
D Vulnerability
A vulnerability is a security weakness in software, hardware, or settings. Attackers use it to enter systems or steal data. Regular updates and safe configuration reduce vulnerabilities.
The chance of loss due to a threat is known as
A Speed
B Risk
C Cache
D Folder
Risk is the possibility of harm when a threat uses a vulnerability. It depends on how likely an attack is and how much damage it can cause. Controls reduce risk.
The path used by attackers to enter a system is called
A Backup file
B Screen lock
C Attack vector
D Zip folder
An attack vector is the method or route used to attack, like phishing links, weak passwords, or infected USBs. Reducing attack vectors improves overall cyber safety.
Unauthorized exposure of private data is called
A Data breach
B Data entry
C File sharing
D Disk cleanup
A data breach happens when sensitive data is accessed or exposed without permission. It can occur due to hacking, stolen passwords, or poor settings. Reporting and fixing fast reduces damage.
Stealing someone’s personal details to misuse them is
A File transfer
B Identity theft
C Disk backup
D Screen capture
Identity theft is using someone’s personal information without permission, often for fraud. Strong passwords, 2FA, and careful sharing of personal data help reduce identity theft risk.
A rulebook of security do’s and don’ts in an office is
A Screen theme
B File index
C CPU speed
D Security policy
A security policy sets rules for safe use of systems, like password rules and reporting incidents. It helps users follow consistent security practices and reduces mistakes that attackers exploit.
Reporting a suspicious email to IT is an example of
A Disk formatting
B File compressing
C Incident reporting
D Screen mirroring
Incident reporting means informing the right team about suspected threats or unusual activity. Early reporting helps contain phishing or malware quickly and prevents the same attack from spreading to others.
Training users to spot scams mainly improves
A Printer speed
B Awareness training
C Battery backup
D Screen size
Awareness training teaches users how to recognize phishing, unsafe links, and suspicious attachments. Because many attacks target humans, training reduces mistakes and improves safe behavior.
Which term means “malicious software”?
A Malware
B Firmware
C Freeware
D Shareware
Malware is any harmful software made to damage systems, steal data, or control devices. Viruses, worms, trojans, ransomware, spyware, and keyloggers are all malware types.
A virus usually needs what to spread?
A Wi-Fi router
B Screen lock
C Power cable
D Host file/program
A virus attaches to a file or program and spreads when the infected file runs. Avoid unknown attachments and scan files to reduce the chance of running a virus.
A worm spreads mainly by
A Keyboard typing
B Screen recording
C Network self-spread
D Battery drain
A worm can spread across networks without user action by exploiting weaknesses. Updating systems and using firewalls reduce worm spread and protect multiple devices on the same network.
A trojan is dangerous because it
A Cleans storage
B Looks like safe app
C Speeds internet
D Fixes errors
A trojan pretends to be a useful program but performs harmful actions after installation. Downloading from trusted sources and scanning installers helps prevent trojan infections.
Ransomware mainly does what?
A Improves privacy
B Speeds computer
C Deletes cookies
D Locks/encrypts files
Ransomware encrypts or locks files and demands payment. Backups, updates, and careful handling of attachments reduce infection risk. Restore from backups is safer than paying.
Software that records keystrokes is called
A Firewall
B Compressor
C Keylogger
D Scanner
A keylogger captures what you type, including passwords and OTPs. Using 2FA, updated security tools, and avoiding unsafe downloads helps protect accounts from keylogger-based theft.
Unwanted ads caused by malware is usually
A Hardware
B Adware
C Shareware
D Firmware
Adware shows unwanted advertisements and may track browsing behavior. It often enters through bundled free software. Install apps carefully and use anti-malware tools to remove it.
Spyware mainly tries to
A Steal private data
B Charge battery
C Increase RAM
D Improve sound
Spyware secretly collects information like browsing activity, logins, or personal data. Anti-spyware scanning, safe installs, and permission control reduce spyware risks.
Many infected devices controlled together are called
A Bookmark
B Backup
C Botnet
D Browser
A botnet is a group of infected devices controlled by an attacker. It can be used for spam or attacks. Keeping devices protected and updated prevents them from becoming botnet “zombies.”
A tool that blocks unauthorized network traffic is
A Notepad
B Calculator
C Media player
D Firewall
A firewall controls incoming and outgoing network connections using rules. It helps prevent unauthorized access and reduces attacks from the internet or local networks.
Antivirus “real-time protection” means
A Scans once yearly
B Scans while running
C Deletes all files
D Turns off updates
Real-time protection monitors files and programs continuously. It blocks threats when they appear, reducing infection chances before a full scan is needed.
Antivirus keeps suspicious files safely isolated in
A Desktop
B Downloads
C Quarantine
D Recycle bin
Quarantine stores suspicious files in a restricted area so they cannot run. This helps stop harm while allowing later deletion or safe restoration if it turns out to be a false alarm.
Antivirus signatures are used to detect
A Known malware patterns
B Screen defects
C Keyboard issues
D Battery problems
Signatures are known patterns of malware files or behavior. Antivirus compares files against signatures to detect threats. Regular updates add new signatures to detect newer malware.
Heuristic scanning helps find
A Only old viruses
B New unknown threats
C Faster Wi-Fi
D Printer errors
Heuristic scanning looks for suspicious behavior instead of only matching signatures. It helps detect new malware variants, though it can sometimes flag safe files by mistake.
A scan planned to run automatically later is
A Screen lock
B Disk resize
C File rename
D Scheduled scan
Scheduled scans run automatically at set times. They help find threats regularly, even when users forget to scan. Combined with real-time protection, they improve safety.
Safe mode scanning can help because
A Faster charging
B Better graphics
C Less malware active
D More storage
In safe mode, fewer programs run, so many malware components are inactive. This can make detection and removal easier during scanning.
A strong password should be
A Same everywhere
B Long and unique
C Only your name
D Only numbers
Long and unique passwords are harder to guess and reduce damage if one account leaks. Reusing passwords is risky because one leak can unlock many accounts.
A passphrase is usually
A Short PIN only
B Email subject line
C Wi-Fi network name
D Longer word sentence
A passphrase is a longer set of words that is easier to remember and harder to guess. Length is a strong defense against guessing and brute-force attacks.
A password manager helps you
A Boost internet speed
B Remove all viruses
C Store passwords securely
D Increase screen size
Password managers store and generate strong unique passwords. This reduces reuse and helps protect accounts even when users have many logins.
2FA adds security by requiring
A Second verification step
B Bigger password box
C Faster mouse clicks
D Extra screen lock
2FA requires another proof like OTP or app approval along with the password. Even if the password is stolen, the attacker still cannot log in easily.
In General, OTP stands for
A Online transfer process
B One-time password
C Open text protocol
D Original typing plan
OTP is a temporary code used once for login or transaction approval. It reduces misuse of stolen passwords because the code expires quickly.
Phishing mainly aims to steal
A Screen brightness
B Printer ink
C File names
D Passwords and data
Phishing tricks users into sharing login details, bank data, or OTPs using fake messages and websites. Checking domains and avoiding unknown links helps prevent it.
Smishing is phishing through
A Wi-Fi routers
B USB drives
C SMS messages
D Phone settings
Smishing uses text messages to trick users into clicking links or sharing OTPs. Avoid unknown SMS links and verify using official apps or websites.
Vishing is phishing through
A Browser cookies
B Voice calls
C Email filters
D QR codes
Vishing scams happen through phone calls where attackers impersonate bank or support staff. Never share OTPs or passwords on calls; verify through official numbers.
A spoofed email means
A Fake sender identity
B Strong encryption used
C Backup created
D Antivirus updated
Email spoofing makes a message look like it came from a trusted sender. Always verify unexpected requests, especially for money, passwords, or OTPs, using another trusted channel.
A QR scam usually tries to
A Fix camera focus
B Increase Wi-Fi speed
C Open malicious link
D Clean device storage
QR scams can open fake websites or payment pages. Scan only trusted QR codes and check the URL shown before entering details or making payments.
Safe browsing includes checking
A Screen resolution
B Battery level
C Printer driver
D Website domain name
Checking the domain name helps avoid fake sites used for phishing. Look for correct spelling and trusted domains, especially on login pages, and avoid clicking unknown shortened links.
HTTPS mainly provides
A Faster internet speed
B Encrypted web connection
C Larger file storage
D Cleaner screen display
HTTPS encrypts data between your browser and a website, reducing interception risk. It improves privacy, but you must still verify the correct domain because scammers can also use HTTPS.
A security patch is a
A Fix for vulnerability
B New printer file
C Battery saver mode
D Screen brightness tool
A security patch fixes known software weaknesses that attackers exploit. Applying patches quickly reduces risk of infection, unauthorized access, and data breaches.
A good backup practice is to keep one copy
A Only on same PC
B In recycle bin
C Offline or disconnected
D Shared publicly
Offline backups are safer from ransomware because they are not connected during an attack. Keeping a disconnected copy and testing restore steps ensures real recovery when needed.
Malware removal should start by
A Sharing files online
B Disabling antivirus
C Ignoring all alerts
D Disconnecting from network
Disconnecting stops malware from spreading and prevents it from contacting attacker servers. Then scan with updated tools, remove threats, apply patches, and change passwords from a clean device.
Encryption is used mainly to
A Speed up CPU
B Make data unreadable
C Delete malware
D Increase RAM
Encryption converts data into coded form that needs a key to read. It protects privacy for stored files and online transfers, especially if a device is lost or data is intercepted.
Data privacy mainly means
A Boost Wi-Fi range
B Improve screen color
C Increase print speed
D Protect personal information
Data privacy is about collecting, using, and storing personal data responsibly. Limiting sharing, using encryption, and following policies reduces misuse and legal risks.
Ad tracking is reduced by blocking
A Screen notifications
B Keyboard shortcuts
C Third-party cookies
D Printer services
Third-party cookies can track users across multiple websites. Blocking them reduces profiling and targeted ads. Browser privacy settings help control tracking and protect user privacy.
Safe disposal of old data best requires
A Simple delete
B Secure wiping
C Folder rename
D Move to desktop
Deleting files does not fully remove them. Secure wiping overwrites data so it cannot be recovered easily. For sensitive devices, encryption plus wipe provides stronger protection.
Safe USB practice is to
A Scan before opening
B Trust unknown USB
C Enable auto-run
D Share to everyone
USB drives can carry malware. Scanning and disabling auto-run reduces infection risk. Avoid using unknown USB drives found in public places.
A digital footprint means
A Screen fingerprint marks
B RAM usage graph
C Online activity traces
D Printer ink record
A digital footprint is the data trail you leave online, like posts, searches, and profile details. Limiting oversharing and using privacy settings helps protect identity and safety.
The best first action for suspected phishing at work is
A Forward to friends
B Report to IT
C Click link to test
D Reply with OTP
Reporting phishing helps the security team block malicious links and warn others. Clicking or forwarding can spread risk. Always report using official channels and delete the message after reporting.
Threat modeling basics mainly involve
A Increasing internet speed
B Cleaning disk space
C Changing screen theme
D Listing threats and paths
Threat modeling identifies possible attackers, targets, and attack paths. It helps plan protections early, making systems safer by reducing likely attack routes and strengthening weak points.
A common cybercrime type is
A Disk defrag
B File copying
C Online fraud
D Screen casting
Cybercrime includes online fraud, identity theft, hacking, and malware attacks. Safe practices, strong authentication, and careful verification reduce the chance of becoming a victim.
Layered security means using
A Only one password
B Multiple protections together
C Only antivirus
D Only firewall
Layered security combines controls like updates, antivirus, firewall, backups, and awareness training. If one defense fails, others still protect the system, reducing risk and impact.