Chapter 12: Cyber Security, Malware, and Protection Tools (Set-1)

A company stores customer data online. Which term best describes a weakness that attackers can exploit in its system?

A Vulnerability
B Security patch
C Backup copy
D Strong password

You are planning security for a small office. What does “risk” mainly mean in cyber security?

A A confirmed virus
B Internet speed
C File compression
D Chance of harm

A criminal steals personal details to open fake accounts. What is this cybercrime called?

A Identity theft
B Data backup
C Disk cleanup
D File sharing

An attacker uses a stolen link sent through email to enter an account. That link is best described as what?

A Encryption key
B System restore
C Attack vector
D Screen lock

A hacker gets into a database and customer records leak. What is the correct term for this event?

A Safe browsing
B Antivirus update
C Patch management
D Data breach

A student learns security basics and reports suspicious emails. Which practice does this support most?

A Disk defrag
B Awareness training
C Overclocking
D File indexing

When designing protection, you list possible threats and how they might attack. What is this process called?

A Threat modeling
B Data sorting
C File formatting
D Screen casting

A workplace rule says “report any suspected breach immediately.” This rule is best called a

A Browser cookie
B Device driver
C RAM cache
D Security policy

A user notices unusual pop-ups and slow performance after installing a free game. What is the most likely cause?

A Low battery
B Malware infection
C High resolution
D Printer queue

Which term correctly means “malicious software” in general?

A Firmware
B Freeware
C Shareware
D Malware

A virus usually needs what to spread to other files on a computer?

A Monitor driver
B Screen saver
C Host file/program
D Zip folder

A worm spreads across networks without needing a user to open a file. What makes this possible?

A Manual updates
B File compression
C Screen brightness
D Self-replication

A trojan pretends to be a useful app but installs harmful code. What key feature describes it?

A Disguised as legitimate
B Only hardware damage
C Always deletes files
D Needs no internet

Your files are locked and you see a message asking money to unlock them. Which malware is this?

A Adware
B Ransomware
C Firewall
D Cookie tracker

Software that records everything typed on a keyboard is called a

A Screen filter
B Data parser
C Disk manager
D Keylogger

Malware designed mainly to show unwanted advertisements is called

A Firmware
B Compiler
C Adware
D Hypervisor

Malware that secretly monitors a user’s activity and steals information is called

A Spyware
B Freeware
C Clipboard tool
D Power saver

A group of infected computers controlled remotely by an attacker is known as a

A Backbone
B Sandbox
C Bookmark
D Botnet

A malware “payload” means

A Internet connection speed
B File size limit
C Harmful action done
D Keyboard shortcut

Which malware type often hides deep in the system to avoid detection?

A Rootkit
B Spreadsheet
C Wallpaper
D Text editor

Antivirus “real-time protection” mainly means

A Only manual scans
B Scans as you use
C Stops all updates
D Deletes every file

When antivirus isolates a suspicious file so it cannot run, it is placed in

A Recycle bin
B Desktop
C Taskbar
D Quarantine

Antivirus “signature” is best described as

A Known threat pattern
B Password hint
C Wi-Fi name
D Screen resolution

A heuristic scan is useful because it can detect

A Only old viruses
B Battery problems
C New, unknown threats
D Monitor damage

Which utility helps block unauthorized network access to a computer?

A Calculator
B Notepad
C Media player
D Firewall

Running antivirus updates regularly is important mainly because

A New threats appear
B RAM becomes larger
C Screen becomes brighter
D Mouse moves faster

A “scheduled scan” in antivirus software is used to

A Increase internet speed
B Scan automatically later
C Hide user files
D Repair hardware

A “safe mode scan” can help because

A Wi-Fi becomes faster
B Screen turns blue
C RAM becomes empty
D Fewer programs run

The idea of “sandboxing” in security means

A Faster file copying
B Permanent file deletion
C Isolated testing area
D Higher screen quality

After removing malware, which step helps prevent the same attack again?

A Apply security patches
B Lower brightness
C Change wallpaper
D Clear recycle bin

A strong password should generally be

A Same everywhere
B Only your name
C Only numbers
D Long and unique

Which is usually stronger for security?

A Passphrase
B Birth date
C Phone number
D First name

A password manager mainly helps by

A Increasing screen size
B Cleaning junk files
C Storing passwords safely
D Blocking all emails

2FA improves account security because it needs

A Faster internet connection
B New keyboard layout
C Extra storage space
D Second verification step

OTP is best described as

A Permanent password
B One-time code
C Wi-Fi signal
D Email subject

Which habit best supports safe browsing?

A Check website address
B Share passwords openly
C Disable all updates
D Click unknown popups

Secure downloads mainly means you should

A Download every free file
B Ignore warnings always
C Turn off antivirus
D Use trusted sources

Regular backups protect you most directly from

A Screen scratches
B Ransomware data loss
C Keyboard dust
D Slow processor

Enabling device lock helps protect data if a phone is

A Fully charged
B Connected by cable
C Put on silent
D Lost or stolen

“Secure Wi-Fi” at home most importantly includes

A WPA2/WPA3 password
B Open network name
C No router updates
D Shared admin login

Social engineering attacks mainly target

A Hard disk size
B Screen resolution
C Human trust
D Printer speed

An email asking you to “verify your bank login” via a link is most likely

A Defragmentation
B Compression
C Encryption
D Phishing

Smishing is phishing done through

A Voice calls
B SMS messages
C Printed letters
D USB drives

Vishing is a scam carried out using

A Voice call
B QR code only
C Bluetooth file
D Browser cookie

A spoofed email address means the attacker

A Repairs your computer
B Encrypts your backups
C Updates antivirus
D Fakes sender identity

A QR scam often tries to make you

A Increase screen brightness
B Clean temporary files
C Open malicious link
D Update keyboard drivers

Before opening an email attachment from an unknown sender, the safest step is to

A Verify sender first
B Disable antivirus
C Forward to everyone
D Rename the file

Which sign most strongly suggests a fake website link?

A Clear page layout
B Fast page loading
C Normal logo image
D Misspelled domain name

HTTPS mainly helps by

A Increasing RAM speed
B Encrypting web traffic
C Deleting cookies
D Blocking all ads

When you suspect a security incident at work, the best first action is to

A Report to IT team
B Hide it quietly
C Share on social media
D Delete all evidence

Leave a Reply

Your email address will not be published. Required fields are marked *