Chapter 12: Cyber Security, Malware, and Protection Tools (Set-10)

A company blocks inbound ports but leaves all outbound traffic open. Which attack goal is still easiest?

A Screen capture
B Disk defrag
C Data exfiltration
D Font change

One weak admin password is reused on many devices. If attackers crack it once, what becomes easiest next?

A Screen sharing
B Lateral movement
C Disk cleanup
D File sorting

Attackers try one common password across many accounts to avoid lockouts. What is this called?

A Password spraying
B Brute force
C Port forwarding
D Disk wiping

A malicious file changes its code each time but keeps the same behavior, reducing signature matches. This technique is

A Sandboxing
B Hashing
C Polymorphism
D Quarantine

An email uses a real logo, but the sender domain is slightly altered. Which quick check is most reliable?

A Logo quality
B Email length
C Font style
D Exact domain check

A macro-enabled document asks to “Enable Content,” then downloads malware. Which control best stops this?

A Macro restriction policy
B Higher brightness
C Larger storage
D Faster CPU

A user has access to many shared folders. Ransomware hits the PC. What factor most increases damage?

A Screen timeout
B Wi-Fi speed
C Excessive permissions
D Speaker volume

Malware runs mainly in RAM and leaves few files on disk. Which type fits best?

A Boot virus
B Adware
C Spyware
D Fileless malware

A botnet is managed using external servers that send commands. These servers are called

A Local cache
B Command-and-control
C Backup vault
D VPN tunnel

A rootkit is especially dangerous because it can

A Hide other malware
B Improve speed
C Fix drivers
D Increase storage

HTTPS is present on a fake login site. What is the correct conclusion?

A HTTPS blocks phishing
B HTTPS stops malware
C HTTPS doesn’t prove trust
D HTTPS means safe

A scammer calls claiming bank support and asks for OTP to “cancel fraud.” What is this attack?

A Vishing
B Smishing
C Spoofing
D Adware

A payment email asks to change vendor bank details urgently. Which fraud type is most likely?

A Worm spread
B Keylogger
C BEC scam
D Cookie theft

An outbound firewall blocks unknown apps from connecting. Which major threat does this reduce most?

A Screen glare
B Data exfiltration
C Battery drain
D File rename

A user reuses one password on many sites. After one leak, which attack becomes most effective?

A Credential stuffing
B Disk scanning
C Safe browsing
D Sandboxing

Antivirus marks a safe file as malware. This is called

A False negative
B Data breach
C False positive
D Backdoor

Malware exists but the antivirus says “clean.” This error is

A False positive
B False negative
C Quarantine
D Patch

A backup drive is always connected to the PC. During ransomware, what is likely?

A Backup blocks ransomware
B Backup stays untouched
C Backup speeds recovery
D Backup gets encrypted

A security team wants proof of who accessed what and when. Which control supports this best?

A Detailed logging
B Wallpaper policy
C Screen timeout
D File naming

A system uses least privilege. What does it primarily limit after compromise?

A Screen quality
B CPU speed
C Blast radius
D Disk size

A company wants to reduce phishing success long term. Most effective approach is

A Bigger monitors
B Awareness training
C More storage
D Faster internet

A worm spreads through an unpatched service. Which control best prevents this?

A Higher brightness
B Longer passwords
C Timely patching
D More backups

A device becomes part of a botnet. What is it commonly used for?

A DDoS flooding
B Disk cleanup
C File backup
D Screen recording

A QR code on a random poster opens a payment page for “KYC update.” Best safe action is to

A Pay immediately
B Share OTP
C Disable antivirus
D Verify URL first

A security baseline is used to ensure

A Maximum screen size
B Minimum secure config
C Highest CPU speed
D Largest storage

A “typosquatted” domain is used to

A Encrypt data
B Stop malware
C Trick with spelling
D Speed browsing

A sandbox is most useful for

A Testing suspicious files
B Making backups
C Increasing RAM
D Deleting cookies

Outbound traffic control is important because many malware types must

A Print documents
B Change fonts
C Call home
D Save images

A user clicks a suspicious link accidentally. Best immediate step is

A Share screenshot
B Disconnect network
C Disable firewall
D Ignore it

Encryption at rest protects most when

A Wi-Fi is slow
B Screen is dim
C Battery is low
D Device is lost

Data minimization reduces breach impact because

A More ads shown
B Faster Wi-Fi
C Less data stored
D Longer emails

Third-party cookies mainly increase

A Cross-site tracking
B Virus detection
C Backup speed
D Screen clarity

Secure disposal of storage should include

A Simple delete
B Folder rename
C Move to desktop
D Certified wiping

A phishing site requests OTP right after password entry. Best response is

A Enter OTP
B Refresh page
C Close and report
D Try later

A company wants to detect abnormal logins quickly. Best simple control is

A Login alerts
B Bigger monitors
C File compression
D Screen themes

A “patch window” that is too slow increases risk mainly because

A Wi-Fi slows down
B Screens flicker
C Exploits appear fast
D Files grow bigger

A malware removal plan should include changing passwords because

A Screen may flicker
B Disk may defrag
C RAM may increase
D Credentials may be stolen

A company uses “defense in depth.” This means

A One strong password
B Multiple security layers
C Only firewall
D Only antivirus

A “drive-by download” attack often relies on

A Long passwords
B Offline backups
C Unpatched browser
D Secure wiping

Phishing prevention improves most when users always

A Verify via official channel
B Trust urgent emails
C Share OTP quickly
D Click shortened links

A system shows unknown extensions installed in browser. Best first fix is

A Increase brightness
B Rename folders
C Disable updates
D Remove and scan

A security policy is most useful because it

A Boosts CPU
B Speeds Wi-Fi
C Sets clear rules
D Improves graphics

The “attack vector” in a phishing case is usually

A Malicious link
B Screen issue
C Disk error
D Power surge

Data breach response should start with

A Hiding evidence
B Containment steps
C Deleting logs
D Sharing publicly

If a system is infected, why avoid restoring from backup immediately?

A Screen may dim
B Wi-Fi may slow
C CPU may heat
D Backup may be infected

A safe computing habit that reduces malware risk most is

A Use bright screen
B Disable firewall
C Keep software updated
D Share passwords

Which practice best protects privacy on shared computers?

A Log out of accounts
B Save passwords openly
C Disable screen lock
D Ignore updates

Incident reporting is important because it

A Increases ads
B Speeds containment
C Slows Wi-Fi
D Changes fonts

A “spoofed” phone number can mislead users because it

A Encrypts calls
B Blocks malware
C Looks official
D Speeds network

Secure Wi-Fi at home should include

A WPA2/WPA3 encryption
B Open network
C Default admin login
D Shared guest password

Leave a Reply

Your email address will not be published. Required fields are marked *