Chapter 12: Cyber Security, Malware, and Protection Tools (Set-6)

Which term means “harmful online danger”?

A Disk space
B Screen saver
C Cyber threat
D File format

A weakness in software that attackers can exploit is called

A Wallpaper
B Brightness
C Keyboard
D Vulnerability

The chance of loss due to a threat is known as

A Speed
B Risk
C Cache
D Folder

The path used by attackers to enter a system is called

A Backup file
B Screen lock
C Attack vector
D Zip folder

Unauthorized exposure of private data is called

A Data breach
B Data entry
C File sharing
D Disk cleanup

Stealing someone’s personal details to misuse them is

A File transfer
B Identity theft
C Disk backup
D Screen capture

A rulebook of security do’s and don’ts in an office is

A Screen theme
B File index
C CPU speed
D Security policy

Reporting a suspicious email to IT is an example of

A Disk formatting
B File compressing
C Incident reporting
D Screen mirroring

Training users to spot scams mainly improves

A Printer speed
B Awareness training
C Battery backup
D Screen size

Which term means “malicious software”?

A Malware
B Firmware
C Freeware
D Shareware

A virus usually needs what to spread?

A Wi-Fi router
B Screen lock
C Power cable
D Host file/program

A worm spreads mainly by

A Keyboard typing
B Screen recording
C Network self-spread
D Battery drain

A trojan is dangerous because it

A Cleans storage
B Looks like safe app
C Speeds internet
D Fixes errors

Ransomware mainly does what?

A Improves privacy
B Speeds computer
C Deletes cookies
D Locks/encrypts files

Software that records keystrokes is called

A Firewall
B Compressor
C Keylogger
D Scanner

Unwanted ads caused by malware is usually

A Hardware
B Adware
C Shareware
D Firmware

Spyware mainly tries to

A Steal private data
B Charge battery
C Increase RAM
D Improve sound

Many infected devices controlled together are called

A Bookmark
B Backup
C Botnet
D Browser

A tool that blocks unauthorized network traffic is

A Notepad
B Calculator
C Media player
D Firewall

Antivirus “real-time protection” means

A Scans once yearly
B Scans while running
C Deletes all files
D Turns off updates

Antivirus keeps suspicious files safely isolated in

A Desktop
B Downloads
C Quarantine
D Recycle bin

Antivirus signatures are used to detect

A Known malware patterns
B Screen defects
C Keyboard issues
D Battery problems

Heuristic scanning helps find

A Only old viruses
B New unknown threats
C Faster Wi-Fi
D Printer errors

A scan planned to run automatically later is

A Screen lock
B Disk resize
C File rename
D Scheduled scan

Safe mode scanning can help because

A Faster charging
B Better graphics
C Less malware active
D More storage

A strong password should be

A Same everywhere
B Long and unique
C Only your name
D Only numbers

A passphrase is usually

A Short PIN only
B Email subject line
C Wi-Fi network name
D Longer word sentence

A password manager helps you

A Boost internet speed
B Remove all viruses
C Store passwords securely
D Increase screen size

2FA adds security by requiring

A Second verification step
B Bigger password box
C Faster mouse clicks
D Extra screen lock

In General, OTP stands for

A Online transfer process
B One-time password
C Open text protocol
D Original typing plan

Phishing mainly aims to steal

A Screen brightness
B Printer ink
C File names
D Passwords and data

Smishing is phishing through

A Wi-Fi routers
B USB drives
C SMS messages
D Phone settings

Vishing is phishing through

A Browser cookies
B Voice calls
C Email filters
D QR codes

A spoofed email means

A Fake sender identity
B Strong encryption used
C Backup created
D Antivirus updated

A QR scam usually tries to

A Fix camera focus
B Increase Wi-Fi speed
C Open malicious link
D Clean device storage

Safe browsing includes checking

A Screen resolution
B Battery level
C Printer driver
D Website domain name

HTTPS mainly provides

A Faster internet speed
B Encrypted web connection
C Larger file storage
D Cleaner screen display

A security patch is a

A Fix for vulnerability
B New printer file
C Battery saver mode
D Screen brightness tool

A good backup practice is to keep one copy

A Only on same PC
B In recycle bin
C Offline or disconnected
D Shared publicly

Malware removal should start by

A Sharing files online
B Disabling antivirus
C Ignoring all alerts
D Disconnecting from network

Encryption is used mainly to

A Speed up CPU
B Make data unreadable
C Delete malware
D Increase RAM

Data privacy mainly means

A Boost Wi-Fi range
B Improve screen color
C Increase print speed
D Protect personal information

Ad tracking is reduced by blocking

A Screen notifications
B Keyboard shortcuts
C Third-party cookies
D Printer services

Safe disposal of old data best requires

A Simple delete
B Secure wiping
C Folder rename
D Move to desktop

Safe USB practice is to

A Scan before opening
B Trust unknown USB
C Enable auto-run
D Share to everyone

A digital footprint means

A Screen fingerprint marks
B RAM usage graph
C Online activity traces
D Printer ink record

The best first action for suspected phishing at work is

A Forward to friends
B Report to IT
C Click link to test
D Reply with OTP

Threat modeling basics mainly involve

A Increasing internet speed
B Cleaning disk space
C Changing screen theme
D Listing threats and paths

A common cybercrime type is

A Disk defrag
B File copying
C Online fraud
D Screen casting

Layered security means using

A Only one password
B Multiple protections together
C Only antivirus
D Only firewall

Leave a Reply

Your email address will not be published. Required fields are marked *