Chapter 12: Cyber Security, Malware, and Protection Tools (Set-1)
A company stores customer data online. Which term best describes a weakness that attackers can exploit in its system?
A Vulnerability
B Security patch
C Backup copy
D Strong password
A vulnerability is a weakness in software, hardware, or settings that can be exploited. Fixing vulnerabilities with updates and secure configuration reduces the chances of an attacker gaining unauthorized access.
You are planning security for a small office. What does “risk” mainly mean in cyber security?
A A confirmed virus
B Internet speed
C File compression
D Chance of harm
Risk is the likelihood and impact of a threat exploiting a vulnerability. Even if a threat exists, strong controls can lower the chance of damage or data loss.
A criminal steals personal details to open fake accounts. What is this cybercrime called?
A Identity theft
B Data backup
C Disk cleanup
D File sharing
Identity theft happens when someone uses your personal information without permission, often for financial gain. Protecting IDs, using 2FA, and monitoring accounts helps reduce this risk.
An attacker uses a stolen link sent through email to enter an account. That link is best described as what?
A Encryption key
B System restore
C Attack vector
D Screen lock
An attack vector is the path or method used to gain unauthorized access, like malicious links, weak passwords, or infected USB drives. Blocking common vectors improves security.
A hacker gets into a database and customer records leak. What is the correct term for this event?
A Safe browsing
B Antivirus update
C Patch management
D Data breach
A data breach is unauthorized access or exposure of sensitive data. It can happen due to weak security, stolen credentials, or malware. Quick reporting and fixes limit damage.
A student learns security basics and reports suspicious emails. Which practice does this support most?
A Disk defrag
B Awareness training
C Overclocking
D File indexing
Awareness training teaches users to recognize threats like phishing and unsafe downloads. Since many attacks start with human mistakes, training reduces successful scams and improves incident reporting.
When designing protection, you list possible threats and how they might attack. What is this process called?
A Threat modeling
B Data sorting
C File formatting
D Screen casting
Threat modeling identifies possible attackers, targets, and attack paths. It helps you plan controls before incidents happen, improving overall security and making policies more practical.
A workplace rule says “report any suspected breach immediately.” This rule is best called a
A Browser cookie
B Device driver
C RAM cache
D Security policy
A security policy is a formal set of rules and procedures to protect systems and data. It defines user responsibilities, reporting steps, and acceptable behavior to reduce risks.
A user notices unusual pop-ups and slow performance after installing a free game. What is the most likely cause?
A Low battery
B Malware infection
C High resolution
D Printer queue
Unexpected pop-ups and slowdown can be symptoms of malware such as adware or spyware. Untrusted downloads are common infection methods. Scanning with updated security tools can help confirm and remove it.
Which term correctly means “malicious software” in general?
A Firmware
B Freeware
C Shareware
D Malware
Malware is a broad term for harmful software designed to damage, steal data, or disrupt systems. Viruses, worms, trojans, ransomware, spyware, and keyloggers are all types of malware.
A virus usually needs what to spread to other files on a computer?
A Monitor driver
B Screen saver
C Host file/program
D Zip folder
A virus typically attaches to a legitimate file or program and spreads when that host runs. Unlike worms, viruses usually require user action like opening an infected file.
A worm spreads across networks without needing a user to open a file. What makes this possible?
A Manual updates
B File compression
C Screen brightness
D Self-replication
Worms can replicate themselves and spread through network vulnerabilities automatically. Because they don’t always need user action, they can spread quickly if systems are unpatched.
A trojan pretends to be a useful app but installs harmful code. What key feature describes it?
A Disguised as legitimate
B Only hardware damage
C Always deletes files
D Needs no internet
A trojan hides inside software that looks real, tricking users into installing it. Once installed, it can steal data, create backdoors, or download more malware.
Your files are locked and you see a message asking money to unlock them. Which malware is this?
A Adware
B Ransomware
C Firewall
D Cookie tracker
Ransomware encrypts or locks files and demands payment for recovery. Regular backups, updated security patches, and careful handling of email attachments reduce the chance of infection.
Software that records everything typed on a keyboard is called a
A Screen filter
B Data parser
C Disk manager
D Keylogger
A keylogger captures keystrokes to steal passwords and sensitive data. It may come as malware or part of spyware. Using 2FA and security scans helps reduce damage from stolen passwords.
Malware designed mainly to show unwanted advertisements is called
A Firmware
B Compiler
C Adware
D Hypervisor
Adware displays intrusive ads and may track browsing behavior. It often enters through bundled software downloads. Installing apps from trusted sources and scanning regularly helps prevent it.
Malware that secretly monitors a user’s activity and steals information is called
A Spyware
B Freeware
C Clipboard tool
D Power saver
Spyware collects information like browsing habits, logins, or personal data without permission. It can slow systems and leak privacy. Anti-spyware tools and careful permissions reduce risk.
A group of infected computers controlled remotely by an attacker is known as a
A Backbone
B Sandbox
C Bookmark
D Botnet
A botnet is a network of compromised devices controlled by an attacker. It can be used for spam, DDoS attacks, or data theft. Strong security and patching help prevent joining a botnet.
A malware “payload” means
A Internet connection speed
B File size limit
C Harmful action done
D Keyboard shortcut
The payload is the part of malware that performs the damage, such as stealing data, encrypting files, or opening a backdoor. Stopping malware early can prevent the payload from running.
Which malware type often hides deep in the system to avoid detection?
A Rootkit
B Spreadsheet
C Wallpaper
D Text editor
A rootkit is designed to hide malware and give attackers persistent access. It can modify system processes to avoid detection. Using trusted security tools and secure boot options can help.
Antivirus “real-time protection” mainly means
A Only manual scans
B Scans as you use
C Stops all updates
D Deletes every file
Real-time protection monitors files, downloads, and running programs continuously. It tries to block threats immediately, reducing the chance of infection before a full scheduled scan happens.
When antivirus isolates a suspicious file so it cannot run, it is placed in
A Recycle bin
B Desktop
C Taskbar
D Quarantine
Quarantine stores suspicious files in a restricted area to prevent harm. You can later delete or restore them if they are safe. This reduces risk while allowing investigation.
Antivirus “signature” is best described as
A Known threat pattern
B Password hint
C Wi-Fi name
D Screen resolution
A signature is a known digital pattern of a malware file or behavior. Antivirus compares files to signatures to detect threats. Regular updates are important so new threats can be recognized.
A heuristic scan is useful because it can detect
A Only old viruses
B Battery problems
C New, unknown threats
D Monitor damage
Heuristic scanning looks for suspicious behavior and code patterns, not just known signatures. This helps detect new or modified malware, though it may sometimes flag safe files by mistake.
Which utility helps block unauthorized network access to a computer?
A Calculator
B Notepad
C Media player
D Firewall
A firewall monitors and controls incoming and outgoing network traffic based on rules. It helps prevent unauthorized connections and can reduce attacks from the internet or local networks.
Running antivirus updates regularly is important mainly because
A New threats appear
B RAM becomes larger
C Screen becomes brighter
D Mouse moves faster
New malware variants appear frequently. Antivirus updates add new signatures and improved detection methods. Without updates, the antivirus may miss newer threats and provide a false sense of safety.
A “scheduled scan” in antivirus software is used to
A Increase internet speed
B Scan automatically later
C Hide user files
D Repair hardware
Scheduled scans run at set times without manual action. They help catch threats that real-time protection may miss and ensure regular checking, especially for computers used by multiple people.
A “safe mode scan” can help because
A Wi-Fi becomes faster
B Screen turns blue
C RAM becomes empty
D Fewer programs run
In safe mode, fewer services and startup programs run, so some malware is less active. This can make it easier for antivirus tools to detect and remove infections.
The idea of “sandboxing” in security means
A Faster file copying
B Permanent file deletion
C Isolated testing area
D Higher screen quality
Sandboxing runs programs in an isolated environment so they cannot affect the main system easily. It helps safely test suspicious files or apps and reduces damage if they are malicious.
After removing malware, which step helps prevent the same attack again?
A Apply security patches
B Lower brightness
C Change wallpaper
D Clear recycle bin
Security patches fix vulnerabilities that malware and attackers may exploit. Updating the OS and apps closes known weaknesses, reducing the chance of reinfection through the same method.
A strong password should generally be
A Same everywhere
B Only your name
C Only numbers
D Long and unique
Long, unique passwords are harder to guess and reduce damage if one account is compromised. Reusing passwords is risky because one leaked password can unlock multiple accounts.
Which is usually stronger for security?
A Passphrase
B Birth date
C Phone number
D First name
A passphrase is a longer combination of words that is easier to remember yet hard to guess, especially if it is uncommon. Length greatly improves resistance to guessing and brute-force attacks.
A password manager mainly helps by
A Increasing screen size
B Cleaning junk files
C Storing passwords safely
D Blocking all emails
Password managers store and generate strong, unique passwords for different sites. This reduces password reuse and helps you use complex passwords without needing to memorize them all.
2FA improves account security because it needs
A Faster internet connection
B New keyboard layout
C Extra storage space
D Second verification step
Two-factor authentication requires an additional proof like an OTP or app prompt, along with the password. Even if a password is stolen, the attacker still lacks the second factor.
OTP is best described as
A Permanent password
B One-time code
C Wi-Fi signal
D Email subject
An OTP is a one-time password/code that expires quickly. It adds security by making stolen or guessed passwords less useful, because the attacker must also obtain the temporary code.
Which habit best supports safe browsing?
A Check website address
B Share passwords openly
C Disable all updates
D Click unknown popups
Verifying the website address helps avoid fake sites and phishing links. Look for correct spelling, trusted domains, and HTTPS on login pages. Avoid clicking suspicious ads or popups.
Secure downloads mainly means you should
A Download every free file
B Ignore warnings always
C Turn off antivirus
D Use trusted sources
Downloading from official or trusted sources reduces the chance of installing trojans or bundled adware. Always read prompts during installation and avoid unknown “cracked” software.
Regular backups protect you most directly from
A Screen scratches
B Ransomware data loss
C Keyboard dust
D Slow processor
Backups allow you to restore files if ransomware encrypts or deletes them. Keeping offline or cloud backups and testing restore steps ensures you can recover without paying attackers.
Enabling device lock helps protect data if a phone is
A Fully charged
B Connected by cable
C Put on silent
D Lost or stolen
Screen lock, PIN, or biometrics prevent easy access to data if the device is lost or stolen. It reduces unauthorized access to apps, messages, and saved passwords.
“Secure Wi-Fi” at home most importantly includes
A WPA2/WPA3 password
B Open network name
C No router updates
D Shared admin login
Using WPA2/WPA3 with a strong Wi-Fi password prevents casual access. Changing default router admin passwords and keeping firmware updated further reduces risk from nearby attackers.
Social engineering attacks mainly target
A Hard disk size
B Screen resolution
C Human trust
D Printer speed
Social engineering tricks people into revealing information or taking unsafe actions. Attackers may pretend to be a bank, boss, or support staff. Verification steps reduce success.
An email asking you to “verify your bank login” via a link is most likely
A Defragmentation
B Compression
C Encryption
D Phishing
Phishing emails try to steal credentials by sending fake links to look-alike websites. Always check the sender, avoid clicking suspicious links, and visit the official site directly if unsure.
Smishing is phishing done through
A Voice calls
B SMS messages
C Printed letters
D USB drives
Smishing uses text messages to trick users into clicking malicious links or sharing OTPs. Treat unknown SMS links as suspicious, especially messages claiming urgency like “account blocked.”
Vishing is a scam carried out using
A Voice call
B QR code only
C Bluetooth file
D Browser cookie
Vishing is voice phishing where scammers call pretending to be support, bank staff, or officials. Never share OTPs or passwords on calls, and verify using official numbers.
A spoofed email address means the attacker
A Repairs your computer
B Encrypts your backups
C Updates antivirus
D Fakes sender identity
Spoofing makes a message appear to come from a trusted sender. Always verify unexpected requests, check full email headers if needed, and confirm through another channel before acting.
A QR scam often tries to make you
A Increase screen brightness
B Clean temporary files
C Open malicious link
D Update keyboard drivers
QR scams use codes that open harmful websites or prompt unsafe payments. Scan only trusted QR codes and check the URL preview when possible before continuing.
Before opening an email attachment from an unknown sender, the safest step is to
A Verify sender first
B Disable antivirus
C Forward to everyone
D Rename the file
Unknown attachments can contain malware like trojans or ransomware. Verify the sender through a trusted method, and scan attachments before opening. If unsure, do not open.
Which sign most strongly suggests a fake website link?
A Clear page layout
B Fast page loading
C Normal logo image
D Misspelled domain name
Attackers use similar-looking domains with small spelling changes to trick users. Always check the exact domain, especially on login pages. When in doubt, type the official site manually.
HTTPS mainly helps by
A Increasing RAM speed
B Encrypting web traffic
C Deleting cookies
D Blocking all ads
HTTPS encrypts data between your browser and the website, reducing the risk of interception on networks. It does not guarantee a site is safe, but it is important for privacy.
When you suspect a security incident at work, the best first action is to
A Report to IT team
B Hide it quietly
C Share on social media
D Delete all evidence
Quick incident reporting helps limit damage and prevents spread. IT can isolate systems, reset accounts, and investigate safely. Delaying or hiding incidents can make the impact much worse.