Chapter 12: Cyber Security, Malware, and Protection Tools (Set-7)
Which term means “system weakness”?
A Antivirus
B Encryption
C Vulnerability
D Backup
Explanation: A vulnerability is a weakness in software, hardware, or settings that attackers can exploit. Regular updates, secure configuration, and removing unused services help reduce vulnerabilities and improve security.
The “route” used to attack a system is called
A Disk drive
B Attack vector
C File header
D Screen saver
Explanation: An attack vector is the method attackers use to gain entry, such as phishing links, weak passwords, or infected USB drives. Controlling these routes lowers chances of successful attacks.
Unauthorized exposure of sensitive information is a
A Data backup
B Data entry
C Data sorting
D Data breach
Explanation: A data breach happens when private data is accessed or leaked without permission. It may occur from hacking, stolen credentials, or misconfiguration. Quick reporting and fixing helps reduce damage.
A scam where personal details are stolen for misuse is
A Disk cleanup
B File sharing
C Identity theft
D Screen casting
Explanation: Identity theft occurs when someone uses your personal information without permission to commit fraud. Using strong passwords, 2FA, and not oversharing personal data reduces this risk.
Malware is best defined as
A Harmful software
B Useful software
C Office tool
D Media player
Explanation: Malware is software designed to harm systems, steal data, or control devices. It includes viruses, worms, trojans, ransomware, spyware, and more. Updated security tools help detect and stop it.
A virus usually spreads by attaching to a
A Screen pixel
B Printer cable
C Host file
D Power plug
Explanation: A virus commonly attaches to legitimate files and spreads when those files run. Avoid unknown attachments and scan downloads to prevent running infected host files.
A worm can spread mainly through
A Keyboard typing
B Screen rotation
C Battery heat
D Network vulnerability
Explanation: Worms self-spread using security weaknesses in networks and systems, often without user action. Patching systems and using firewalls reduces the chance of worms spreading quickly.
A trojan is dangerous because it
A Fixes software
B Cleans storage
C Looks legitimate
D Increases speed
Explanation: A trojan appears useful or harmless but performs harmful actions after installation, such as stealing data or opening backdoors. Download only from trusted sources and scan installers.
Ransomware mainly targets
A Screen color
B User files
C Keyboard layout
D Speaker volume
Explanation: Ransomware encrypts or locks user files and demands payment. Backups, safe browsing, and updated security patches help prevent ransomware and allow recovery without paying.
Spyware is designed to
A Monitor and steal
B Boost battery
C Improve graphics
D Clean junk
Explanation: Spyware secretly monitors activities and steals information like logins or browsing data. Anti-spyware tools, limiting app permissions, and avoiding unsafe downloads reduce spyware infections.
Adware mainly causes
A Faster boot
B Better audio
C Unwanted advertisements
D More storage
Explanation: Adware shows intrusive ads and may track user behavior. It often comes bundled with free software. Careful installation and security scanning help prevent and remove adware.
A keylogger records
A Screen brightness
B Printer pages
C Battery cycles
D Keystrokes typed
Explanation: Keyloggers capture typed data such as passwords and OTPs. Using 2FA, keeping systems clean, and avoiding suspicious software reduces risk of credential theft.
A botnet is a group of
A Infected devices
B Backup drives
C Safe computers
D Office printers
Explanation: A botnet is a network of compromised devices controlled by an attacker, often used for DDoS or spam. Strong protection and patching prevents devices from becoming part of a botnet.
A rootkit is used to
A Delete cookies
B Speed internet
C Hide malware
D Fix drivers
Explanation: Rootkits hide malicious activity by altering deep system functions. This makes detection and removal difficult. Trusted scans, secure boot checks, and sometimes reinstalling the OS may be needed.
A malware “payload” refers to
A File size
B Harmful action
C Screen layout
D Wi-Fi name
Explanation: The payload is what malware does after infection, such as stealing data, encrypting files, or opening backdoors. Blocking malware early prevents the payload from running.
Antivirus real-time protection means
A Monthly scanning
B No updates needed
C Continuous monitoring
D Only manual scans
Explanation: Real-time protection checks files and programs as they run and blocks threats immediately. It prevents many infections before they spread, and works best with regular updates.
Antivirus quarantine is used to
A Isolate suspicious files
B Share files online
C Compress documents
D Increase disk space
Explanation: Quarantine keeps suspicious files in a safe area so they cannot run. This protects the system while allowing later deletion or restoration if the file was wrongly flagged.
Antivirus signatures detect
A Keyboard errors
B Screen cracks
C Known threats
D Battery drain
Explanation: Signatures are patterns of known malware. Antivirus uses them to match and detect threats. Updating signatures is essential so the antivirus can recognize new malware variants.
Heuristic scanning is useful for
A Printer issues
B Faster Wi-Fi
C Better sound
D New malware types
Explanation: Heuristics look for suspicious behavior, helping detect new or modified threats not yet in signature lists. It improves protection but may sometimes mark safe files wrongly.
A scheduled scan runs
A Only when clicked
B Automatically at time
C Only in safe mode
D Without antivirus
Explanation: Scheduled scans run at set times without manual action. They help maintain regular checking, especially on shared devices, and can detect threats missed by real-time protection.
A firewall mainly controls
A Screen brightness
B File naming
C Network traffic
D Printer speed
Explanation: A firewall filters incoming and outgoing network connections based on rules. It helps block unauthorized access and reduces attacks from the internet and unsafe network connections.
A strong password should be
A Long and unique
B Same everywhere
C Only numbers
D Only name
Explanation: Long unique passwords are harder to guess and reduce damage from leaks. Reusing passwords is risky. Password managers help create strong unique passwords for each account.
A passphrase is usually
A One short word
B Your phone number
C Multiple words string
D Your birth date
Explanation: Passphrases use multiple words and are easy to remember while being long. Length increases resistance to guessing and brute force. Avoid common phrases and personal details.
A password manager stores passwords
A In plain text
B On public page
C In browser cache
D In encrypted vault
Explanation: Password managers store passwords in an encrypted vault protected by a master password. This reduces password reuse and helps you maintain strong unique passwords securely.
2FA makes login safer by
A Shortening password
B Disabling updates
C Adding second factor
D Hiding username
Explanation: Two-factor authentication adds another proof such as OTP or app approval. Even if the password is stolen, attackers usually cannot log in without the second factor.
OTP is a
A Permanent password
B One-time code
C Router setting
D File format
Explanation: OTP is a short-lived code used once for login or transaction confirmation. It adds security by reducing usefulness of stolen passwords, especially with quick expiry.
Safe browsing includes
A Checking exact URL
B Clicking any popups
C Sharing passwords
D Ignoring warnings
Explanation: Checking the exact URL helps avoid fake sites and phishing. Look for correct spelling and trusted domains. Avoid unknown shortened links and type official URLs when possible.
Secure downloads means
A Use pirated sites
B Disable antivirus
C Use trusted sources
D Ignore install prompts
Explanation: Downloading from official or trusted sources reduces malware risk. Scan downloads, avoid “cracked” software, and read installer options to prevent bundled adware or trojans.
Backups are most helpful against
A Screen scratches
B Keyboard dust
C Slow mouse
D Ransomware attacks
Explanation: Backups allow restoring files if ransomware encrypts data. Keep at least one offline backup and test restores. Backups reduce pressure to pay attackers.
Device lock helps when phone is
A Fully charged
B In airplane mode
C Lost or stolen
D On silent mode
Explanation: A lock screen PIN, pattern, or biometric prevents unauthorized access if a device is lost or stolen. It protects apps, messages, and saved accounts from misuse.
Social engineering targets
A Human trust
B Hard disk size
C Screen quality
D Printer speed
Explanation: Social engineering tricks people into revealing information or taking unsafe actions. Attackers impersonate trusted roles. Verification steps and awareness training reduce the success of such tricks.
Phishing emails often contain
A Printer driver
B Backup schedule
C Fake login link
D Disk partition
Explanation: Phishing messages use fake links to steal passwords and OTPs. Check sender domain, hover to preview links, and log in via official sites instead of email links.
Smishing is phishing via
A Voice call
B SMS text
C USB drive
D Browser cookie
Explanation: Smishing uses SMS messages to trick users into clicking links or sharing OTPs. Avoid unknown links in texts and verify using official apps or websites.
Vishing is phishing via
A Email link
B QR code
C Voice call
D Pop-up ad
Explanation: Vishing happens over phone calls where scammers pretend to be bank or support staff. Never share passwords or OTPs on calls. Use official helpline numbers to verify.
Spoofing means
A Faking identity
B Encrypting files
C Updating software
D Compressing folders
Explanation: Spoofing makes messages look like they came from a trusted sender. Always verify suspicious requests through another channel, especially requests for money or sensitive information.
QR scams often lead to
A Better camera zoom
B Faster charging
C Fake payment page
D Cleaner storage
Explanation: QR scams can open malicious or fake payment pages. Scan only trusted QR codes and check the displayed URL. Never enter passwords or bank details unless verified.
HTTPS mainly provides
A Virus removal
B Strong password
C Spam blocking
D Encrypted connection
Explanation: HTTPS encrypts traffic between your browser and website, reducing interception risk. It does not guarantee the site is genuine, so always check the correct domain too.
Security patches are important because they
A Increase brightness
B Add storage
C Fix vulnerabilities
D Improve speakers
Explanation: Patches close known security holes used by attackers. Installing updates quickly reduces chances of malware infection and unauthorized access, especially when exploit details become public.
Malware removal first step is
A Isolate the device
B Share files online
C Disable firewall
D Ignore alerts
Explanation: Isolating the device stops malware from spreading and prevents contact with attacker servers. After isolation, scan with updated tools, remove threats, patch, and change passwords safely.
Encryption helps by
A Increasing file size
B Removing spyware
C Protecting data privacy
D Speeding internet
Explanation: Encryption makes data unreadable without a key. It protects sensitive files on devices and protects data during transfer. It supports confidentiality, especially on public networks.
Data privacy focuses on
A Printer driver updates
B Screen refresh rate
C CPU speed
D Personal data protection
Explanation: Data privacy ensures personal information is collected, used, and stored safely. Limiting collection, controlling access, and using encryption reduce misuse and reduce harm during data breaches.
Third-party cookies mainly enable
A Faster browsing
B Virus detection
C Cross-site tracking
D File recovery
Explanation: Third-party cookies can track users across websites for advertising and profiling. Blocking them and using privacy settings reduces tracking and improves online privacy.
Secure disposal of a drive requires
A Simple delete
B Secure wiping
C Folder rename
D Move to desktop
Explanation: Deleting does not remove data fully. Secure wiping overwrites storage to reduce recovery. For very sensitive data, encryption plus wipe or professional destruction may be used.
Safe USB use includes
A Scan before use
B Enable auto-run
C Trust unknown drives
D Share to others
Explanation: USB drives can carry malware. Scanning and disabling auto-run reduces risk. Avoid unknown USB drives found in public places because they may be intentionally malicious.
Digital footprint means
A Screen fingerprint
B Disk speed
C Online data trail
D Printer history
Explanation: A digital footprint is the trace of your activities online, like posts, likes, and searches. Privacy settings and careful sharing reduce exposure and help protect identity.
An incident response plan helps to
A Increase storage
B Improve graphics
C Boost battery
D Contain and recover
Explanation: Incident response focuses on detecting, containing, removing threats, and restoring systems. It also includes learning from the incident to prevent repeats through better patching and training.
Awareness cues in phishing include
A High image quality
B Short email text
C Strange sender domain
D Large font size
Explanation: Phishing often uses slightly altered domains or unusual sender addresses. Checking the sender domain and link destination helps detect scams. Verify using official contacts before acting.
Cyber laws awareness mainly means
A Follow legal rules
B Disable antivirus
C Share user data
D Hide incidents
Explanation: Cyber laws require protecting data, avoiding unauthorized access, and reporting certain incidents. Following policies and privacy rules reduces legal risk and protects users and organizations.
Threat modeling is used to
A Increase printer speed
B Clean disk space
C Identify threats early
D Improve screen color
Explanation: Threat modeling identifies likely threats, targets, and attack paths. It helps design protections before incidents occur, reducing weak points and improving overall security planning.
Layered security means
A One single tool
B Only antivirus
C Only firewall
D Multiple defenses
Explanation: Layered security uses many protections together like updates, firewall, antivirus, backups, and training. If one defense fails, others still reduce risk and limit damage.