Chapter 12: Cyber Security, Malware, and Protection Tools (Set-8)

A company ranks systems as “critical, important, normal” before applying controls. This process is called

A Disk formatting
B Screen scaling
C Asset classification
D File renaming

A threat becomes more dangerous when it can exploit a

A Wallpaper
B Vulnerability
C Speaker
D Mouse pad

Risk is usually calculated by combining likelihood with

A Impact
B Screen size
C File format
D CPU speed

A login alert shows access from a new country. The best immediate action is to

A Share OTP quickly
B Disable antivirus
C Change password + 2FA
D Ignore the alert

“Least privilege” in an office network means giving users

A Maximum admin rights
B Same access to all
C Full database control
D Minimum required access

A phishing email requests “urgent payment” and a changed bank account. Which scam is most likely?

A BEC fraud
B Disk cleanup
C Screen sharing
D File backup

A user installs a fake “security cleaner” after scary popups. This is best called

A Firmware
B Antivirus
C Scareware
D Encryption

A computer is slow and shows many ads after installing free software. The most likely malware is

A Rootkit
B Worm
C Patch
D Adware

A “backdoor” installed by malware is mainly used for

A Hidden remote access
B Faster startup
C Bigger storage
D Better graphics

A worm spreads faster than a virus mainly because it can

A Need host program
B Spread without user action
C Require manual install
D Run only offline

A ransomware attack usually shows which clear sign?

A Better Wi-Fi speed
B New wallpaper only
C Encrypted files + note
D Quiet computer sound

A tool that blocks unauthorized inbound connections is

A Firewall
B Notepad
C Calculator
D Media player

Antivirus “quarantine” is useful because it

A Deletes backups
B Speeds up internet
C Hides browser tabs
D Stops file execution

Why should antivirus signatures be updated regularly?

A Screen becomes brighter
B Printer works faster
C New threats appear
D Files become smaller

Heuristic scanning is helpful when malware is

A Always harmless
B New or modified
C Only in images
D Only on USB

A scheduled scan is mainly used for

A Faster file copying
B Better screen display
C Automatic regular scanning
D Higher battery life

A strong password reduces success of

A Brute-force guessing
B Disk defrag
C Screen flicker
D File indexing

Credential stuffing becomes likely when users

A Use passphrases
B Enable 2FA
C Reuse same passwords
D Update software

A password manager mainly helps by

A Disabling antivirus
B Sharing OTPs
C Blocking all ads
D Creating unique passwords

2FA is strongest when the second factor is

A Common PIN only
B Authenticator app code
C Username reminder
D Public email link

Smishing is best described as phishing via

A Voice calls
B USB drives
C SMS messages
D Cookies

Vishing is best described as phishing via

A Voice call
B Email attachment
C QR sticker
D Browser ad

Email spoofing is dangerous because it can

A Speed up email
B Encrypt messages
C Look like trusted sender
D Remove spam

A safe way to check a suspicious link is to

A Click it quickly
B Reply with OTP
C Disable browser security
D Hover to view URL

Typosquatting attacks mainly use

A Faster CPU
B Look-alike domains
C Secure backups
D Strong encryption

HTTPS mainly ensures

A Virus-free website
B Faster downloads
C Encrypted web traffic
D Strong password

A VPN is mainly used to

A Encrypt network traffic
B Remove malware
C Clean disk space
D Speed up CPU

A good ransomware defense includes

A Shared admin passwords
B Disabled updates
C Unknown downloads
D Offline backups

Malware removal should start by

A Sharing files online
B Ignoring warnings
C Isolating the device
D Turning off firewall

Patch management mainly helps by

A Closing known weaknesses
B Increasing screen size
C Improving speaker sound
D Reducing file names

Encryption at rest helps protect data when

A Screen is bright
B Wi-Fi is fast
C Device is stolen
D Battery is low

Data minimization supports privacy by

A Sharing data widely
B Keeping data forever
C Disabling passwords
D Collecting only needed

Third-party cookies mainly increase

A Cross-site tracking
B Malware scanning
C File backup
D Screen clarity

Secure disposal of old drives should include

A Simple delete only
B Folder rename
C Certified secure wiping
D Desktop move

Safe USB practice reduces risk of

A Better file transfer
B Extra storage space
C Faster boot
D Malware infection

A digital footprint increases when you

A Enable 2FA
B Share personal data
C Update antivirus
D Lock phone screen

An incident response goal is to

A Speed up internet
B Add new printers
C Contain and recover
D Create wallpapers

Security awareness training mainly helps users

A Recognize phishing cues
B Increase RAM size
C Change printer ink
D Reduce screen glare

A common phishing cue is

A Clear official URL
B Expected attachment
C Known phone number
D Mismatched sender domain

The safest way to confirm a bank message is to

A Reply to message
B Click link inside
C Use official app
D Share OTP quickly

A sandbox is used to

A Speed up Wi-Fi
B Run apps safely
C Delete cookies
D Increase disk size

Outbound firewall rules help prevent

A Screen flicker
B Printer jam
C Low storage
D Data exfiltration

A “false positive” means

A Safe file flagged
B Malware missed
C Backup deleted
D Patch failed

A “false negative” means

A Safe file flagged
B Scan runs faster
C Malware not detected
D Update succeeds

Least privilege mainly limits

A Screen brightness
B Damage after compromise
C Wi-Fi strength
D File compression

A security baseline ensures

A Consistent secure settings
B Faster typing speed
C Bigger monitor size
D Better audio quality

An “attack surface” increases when you

A Use 2FA
B Apply patches
C Use encryption
D Enable unnecessary services

Threat modeling helps by

A Increasing storage
B Improving graphics
C Finding attack paths
D Changing screen theme

A security policy usually defines

A Rules for safe use
B Printer paper size
C Monitor refresh rate
D Keyboard shortcuts

Layered security works best because

A It removes all threats
B It stops updates
C One failure won’t break
D It needs no training

Leave a Reply

Your email address will not be published. Required fields are marked *