Chapter 12: Cyber Security, Malware, and Protection Tools (Set-2)

In cyber security, what term describes anything valuable that must be protected, like files, accounts, or devices?

A Asset
B Firewall
C Attack vector
D Trojan

A “threat” in cyber security is best described as

A Software update
B Backup routine
C Possible harmful event
D Password hint

Which term means “the result or impact if an attack succeeds,” such as money loss or service downtime?

A Cookie
B Impact
C Signature
D Passphrase

An example of “unauthorized access” is

A Installing antivirus
B Updating Windows
C Logging in without permission
D Encrypting a drive

Someone breaks into a system mainly to learn how it works, not to steal. This activity is still generally called

A Formatting
B Hacking
C Imaging
D Streaming

A scam email or message tricks users into entering bank login details on a fake website. What is this cybercrime called?

A Phishing scam
B Disk cleanup
C File syncing
D Screen sharing

In an organization, the best purpose of “incident reporting” is to

A Delete old emails
B Increase Wi-Fi range
C Improve screen quality
D Start quick response

A cyber “attack surface” refers to

A Only antivirus files
B Only Wi-Fi speed
C All possible entry points
D Only backup drives

A common “hacking basics” technique used to guess passwords repeatedly is called

A Screen lock
B Brute force
C Data masking
D Sandboxing

A “security control” is best described as

A Virus file
B Keyboard layout
C Protection measure
D Video format

Which type of malware often spreads by attaching itself to email attachments and running when opened?

A Virus
B Router
C Cookie
D Patch

A worm outbreak in a network is often faster because a worm can

A Only run offline
B Spread without user action
C Need password managers
D Require manual install

A trojan may create a “backdoor,” which means

A Extra RAM space
B Faster browser load
C Temporary file folder
D Hidden access path

Ransomware commonly harms users by

A Cleaning temporary files
B Updating drivers
C Encrypting personal files
D Fixing broken links

Spyware is especially dangerous because it can

A Increase battery life
B Steal private information
C Improve Wi-Fi signal
D Reduce file size

Keyloggers mainly try to capture

A Screen resolution
B Printer settings
C Passwords and OTPs
D Battery temperature

Adware usually causes which problem on a computer?

A Unwanted advertisements
B Faster boot time
C Better graphics
D More storage space

A botnet is commonly used to perform

A File compression
B DDoS attacks
C Disk formatting
D Screen recording

Rootkits are hard to remove mainly because they

A Only show popups
B Never use internet
C Hide inside system
D Only affect printers

A common “infection method” for malware is

A Lower screen brightness
B Extra RAM installed
C Wallpaper change
D Pirated software download

Antivirus “full scan” usually checks

A Only browser history
B Entire system files
C Only keyboard drivers
D Only screen settings

A “quick scan” typically focuses on

A Only external USB
B Only cloud accounts
C Common malware locations
D Only audio drivers

Which feature helps stop known malicious files immediately when downloaded?

A Real-time scanning
B Disk defrag
C Sleep mode
D File renaming

“Quarantine” is used mainly to

A Speed up computer
B Isolate suspicious items
C Create backup images
D Increase internet range

Heuristic detection is helpful when malware is

A Always offline
B Only in videos
C Only in printers
D New or modified

A firewall rule that blocks unknown inbound connections improves

A Screen resolution
B File compression
C Network security
D Battery charging

Anti-spyware tools are designed mainly to detect

A Hardware dust
B Tracking and spying malware
C Broken pixels
D Old documents

Anti-ransomware protection mainly tries to

A Improve Wi-Fi strength
B Increase storage size
C Stop file encryption attack
D Hide desktop icons

Security updates should be installed quickly because they

A Fix known vulnerabilities
B Increase screen size
C Add more RAM
D Change keyboard style

A “system cleanup tool” is most useful after malware removal to

A Increase password length
B Remove leftover junk
C Create phishing emails
D Disable firewall rules

The best example of a “weak password” is

A G!7pL#9xQ@1
B Long word string
C 123456
D Unique random phrase

A password manager improves security most by reducing

A Screen brightness
B Email storage
C Wi-Fi bandwidth
D Password reuse

For high security, 2FA using an authenticator app is generally better than

A Long passwords
B SMS OTP only
C Device lock
D Antivirus scans

A safe habit for account recovery is to

A Update recovery email
B Share OTP with friends
C Use same PIN everywhere
D Disable login alerts

When downloading software, the safest choice is usually

A Random chat link
B Unknown file hosting
C Official vendor website
D Popup download button

A safe browsing step before clicking a link is to

A Disable browser security
B Hover to preview URL
C Turn off updates
D Save passwords publicly

A secure Wi-Fi practice is to change the router’s

A Wallpaper theme
B Screen timeout
C Default admin password
D Desktop icon size

“Privacy settings” on apps are important mainly to control

A Data sharing permissions
B Battery charging speed
C Screen brightness limit
D Keyboard language

A common social engineering trick is pretending to be

A Antivirus update tool
B Technical support staff
C PDF viewer
D Keyboard driver

A phishing email often creates pressure by using

A High image quality
B Large font size
C Urgent warning message
D Short paragraphs

“Impersonation” in scams means

A Compressing a file
B Updating software
C Encrypting a drive
D Pretending to be someone

A strong step to verify a suspicious payment request is to

A Reply to same email
B Call official number
C Click attached link
D Share OTP quickly

A safe method to check a website before login is to

A Type URL manually
B Use random search ads
C Click unknown short link
D Share your password

Cookies in browsers are mainly used to

A Remove malware
B Speed up CPU
C Store site session info
D Encrypt hard drives

Ad tracking can be reduced by

A Sharing passwords publicly
B Limiting third-party cookies
C Disabling all updates
D Turning off firewall

Secure disposal of data on an old laptop best includes

A Just delete files
B Rename folders
C Move to desktop
D Wipe drive securely

Safe USB use helps because unknown USB drives may contain

A Screen saver
B Audio plugin
C Malware payload
D Printer driver

A “digital footprint” means

A Hard disk scratches
B Your online activity traces
C CPU temperature
D Printer ink levels

Basic encryption is used mainly to

A Make data unreadable
B Increase file size
C Speed up internet
D Remove advertisements

After detecting a suspected phishing message in a company, the best action is to

A Forward to all coworkers
B Click link to check
C Report via official channel
D Reply with password

Leave a Reply

Your email address will not be published. Required fields are marked *