Chapter 12: Cyber Security, Malware, and Protection Tools (Set-7)

Which term means “system weakness”?

A Antivirus
B Encryption
C Vulnerability
D Backup

The “route” used to attack a system is called

A Disk drive
B Attack vector
C File header
D Screen saver

Unauthorized exposure of sensitive information is a

A Data backup
B Data entry
C Data sorting
D Data breach

A scam where personal details are stolen for misuse is

A Disk cleanup
B File sharing
C Identity theft
D Screen casting

Malware is best defined as

A Harmful software
B Useful software
C Office tool
D Media player

A virus usually spreads by attaching to a

A Screen pixel
B Printer cable
C Host file
D Power plug

A worm can spread mainly through

A Keyboard typing
B Screen rotation
C Battery heat
D Network vulnerability

A trojan is dangerous because it

A Fixes software
B Cleans storage
C Looks legitimate
D Increases speed

Ransomware mainly targets

A Screen color
B User files
C Keyboard layout
D Speaker volume

Spyware is designed to

A Monitor and steal
B Boost battery
C Improve graphics
D Clean junk

Adware mainly causes

A Faster boot
B Better audio
C Unwanted advertisements
D More storage

A keylogger records

A Screen brightness
B Printer pages
C Battery cycles
D Keystrokes typed

A botnet is a group of

A Infected devices
B Backup drives
C Safe computers
D Office printers

A rootkit is used to

A Delete cookies
B Speed internet
C Hide malware
D Fix drivers

A malware “payload” refers to

A File size
B Harmful action
C Screen layout
D Wi-Fi name

Antivirus real-time protection means

A Monthly scanning
B No updates needed
C Continuous monitoring
D Only manual scans

Antivirus quarantine is used to

A Isolate suspicious files
B Share files online
C Compress documents
D Increase disk space

Antivirus signatures detect

A Keyboard errors
B Screen cracks
C Known threats
D Battery drain

Heuristic scanning is useful for

A Printer issues
B Faster Wi-Fi
C Better sound
D New malware types

A scheduled scan runs

A Only when clicked
B Automatically at time
C Only in safe mode
D Without antivirus

A firewall mainly controls

A Screen brightness
B File naming
C Network traffic
D Printer speed

A strong password should be

A Long and unique
B Same everywhere
C Only numbers
D Only name

A passphrase is usually

A One short word
B Your phone number
C Multiple words string
D Your birth date

A password manager stores passwords

A In plain text
B On public page
C In browser cache
D In encrypted vault

2FA makes login safer by

A Shortening password
B Disabling updates
C Adding second factor
D Hiding username

OTP is a

A Permanent password
B One-time code
C Router setting
D File format

Safe browsing includes

A Checking exact URL
B Clicking any popups
C Sharing passwords
D Ignoring warnings

Secure downloads means

A Use pirated sites
B Disable antivirus
C Use trusted sources
D Ignore install prompts

Backups are most helpful against

A Screen scratches
B Keyboard dust
C Slow mouse
D Ransomware attacks

Device lock helps when phone is

A Fully charged
B In airplane mode
C Lost or stolen
D On silent mode

Social engineering targets

A Human trust
B Hard disk size
C Screen quality
D Printer speed

Phishing emails often contain

A Printer driver
B Backup schedule
C Fake login link
D Disk partition

Smishing is phishing via

A Voice call
B SMS text
C USB drive
D Browser cookie

Vishing is phishing via

A Email link
B QR code
C Voice call
D Pop-up ad

Spoofing means

A Faking identity
B Encrypting files
C Updating software
D Compressing folders

QR scams often lead to

A Better camera zoom
B Faster charging
C Fake payment page
D Cleaner storage

HTTPS mainly provides

A Virus removal
B Strong password
C Spam blocking
D Encrypted connection

Security patches are important because they

A Increase brightness
B Add storage
C Fix vulnerabilities
D Improve speakers

Malware removal first step is

A Isolate the device
B Share files online
C Disable firewall
D Ignore alerts

Encryption helps by

A Increasing file size
B Removing spyware
C Protecting data privacy
D Speeding internet

Data privacy focuses on

A Printer driver updates
B Screen refresh rate
C CPU speed
D Personal data protection

Third-party cookies mainly enable

A Faster browsing
B Virus detection
C Cross-site tracking
D File recovery

Secure disposal of a drive requires

A Simple delete
B Secure wiping
C Folder rename
D Move to desktop

Safe USB use includes

A Scan before use
B Enable auto-run
C Trust unknown drives
D Share to others

Digital footprint means

A Screen fingerprint
B Disk speed
C Online data trail
D Printer history

An incident response plan helps to

A Increase storage
B Improve graphics
C Boost battery
D Contain and recover

Awareness cues in phishing include

A High image quality
B Short email text
C Strange sender domain
D Large font size

Cyber laws awareness mainly means

A Follow legal rules
B Disable antivirus
C Share user data
D Hide incidents

Threat modeling is used to

A Increase printer speed
B Clean disk space
C Identify threats early
D Improve screen color

Layered security means

A One single tool
B Only antivirus
C Only firewall
D Multiple defenses

Leave a Reply

Your email address will not be published. Required fields are marked *