Chapter 12: Cyber Security, Malware, and Protection Tools (Set-9)

A company decides which systems need strongest controls by checking “likelihood + damage.” What is this activity called?

A File indexing
B Disk cleanup
C Risk assessment
D Screen tuning

Attackers often start by collecting employee emails and roles from public sites. This phase is called

A Reconnaissance
B Encryption
C Quarantine
D Backup

A company blocks unused ports and removes unnecessary services. This mainly reduces

A Screen size
B Battery drain
C File format
D Attack surface

A hacker uses a stolen password to access email, then uses that account to reset other services. This is an example of

A Disk defrag
B Data compression
C Account takeover
D Screen casting

A policy says employees should not install software without approval. This policy mainly prevents

A Screen flicker
B Untrusted installs
C Printer jams
D Audio noise

A user sees a message: “Your PC is infected—pay now!” and installs a fake cleaner. This threat is

A Rootkit
B Worm
C Scareware
D Firewall

A malware that looks like a normal app but secretly steals data is a

A Trojan
B Virus
C Worm
D Patch

A worm spreads fastest inside networks because it can

A Need user click
B Require host file
C Run only offline
D Self-propagate

A ransomware incident impacts shared folders the most when users have

A Excessive permissions
B Strong passwords
C 2FA enabled
D Updated antivirus

A keylogger mainly aims to steal

A Screen brightness
B Printer settings
C Passwords and PINs
D File names

A botnet is controlled through

A Wallpaper app
B Command server
C ZIP tool
D Email filter

A rootkit is difficult to detect because it

A Shows many ads
B Deletes all files
C Hides in system
D Uses only SMS

Antivirus “real-time protection” is important because it

A Blocks threats immediately
B Works yearly only
C Needs no updates
D Deletes backups

Quarantine in antivirus is used to

A Increase disk space
B Speed up Wi-Fi
C Hide browser tabs
D Isolate suspicious files

Signature-based detection is strongest for

A New zero-days
B Hardware faults
C Known malware
D Screen issues

Heuristic scanning helps detect

A Only old viruses
B New variants
C Printer issues
D RAM problems

A firewall can reduce attacks mainly by controlling

A Network connections
B Keyboard layout
C Screen colors
D File fonts

A user uses one password on many websites. After one breach, the biggest risk is

A Disk corruption
B Screen burn
C Credential stuffing
D Printer failure

A passphrase is often stronger mainly because it is

A Short and numeric
B Based on name
C Same everywhere
D Longer and memorable

A password manager reduces risk by preventing

A Screen lock
B Password reuse
C File sharing
D Disk cleaning

2FA reduces account takeover because it adds

A Bigger username
B Faster login
C Second factor
D Longer email

A phishing email typically tries to get you to

A Enter credentials
B Update drivers
C Clean storage
D Change wallpaper

Smishing is most likely received through

A Voice call
B USB drive
C SMS text
D Browser cookie

Vishing is most likely done using

A Email links
B Phone calls
C QR codes
D Popups

Spoofing in cyber scams mainly means

A Encrypting data
B Removing malware
C Creating backups
D Faking identity

A safe way to confirm a bank alert is to

A Open official app
B Click SMS link
C Reply with OTP
D Forward to all

HTTPS indicates

A Trusted company
B Virus-free page
C Encrypted connection
D Fast internet

A VPN is most useful on public Wi-Fi to

A Remove spyware
B Encrypt traffic
C Speed internet
D Block all ads

Keeping one backup offline helps mainly against

A Ransomware
B Screen damage
C Battery drain
D Keyboard dust

After detecting malware, the best first action is to

A Disable antivirus
B Share files
C Ignore alerts
D Disconnect network

Patch management mainly reduces

A Screen brightness
B Printer errors
C Known vulnerabilities
D File size

Encryption at rest protects data if

A Device is stolen
B Wi-Fi is slow
C Screen is cracked
D Battery is low

Data minimization helps privacy by

A Sharing more data
B Keeping forever
C Disabling locks
D Collecting less data

Third-party cookies mainly increase

A Malware removal
B Backup speed
C Tracking across sites
D Screen quality

Secure disposal of a drive requires

A Secure wiping
B Simple delete
C Rename folders
D Move files

Safe USB behavior reduces risk of

A Faster transfers
B Extra storage
C Malware infection
D Better audio

A digital footprint is mainly your

A Screen fingerprint
B Online activity trail
C Disk usage graph
D Printer history

Incident response focuses on

A Detect, contain, recover
B Print, scan, copy
C Browse, download, share
D Sleep, restart, format

Awareness training mainly improves

A CPU performance
B Screen resolution
C Safe user behavior
D Printer speed

Threat modeling helps by identifying

A Screen settings
B Likely attack paths
C Disk partitions
D Printer queues

“Attack vector” means

A Backup location
B Disk partition
C Screen mode
D Method of attack

A data breach often results from

A Low battery
B Slow CPU
C Unauthorized access
D Small screen

Least privilege helps most after

A Account compromise
B Screen damage
C Printer jam
D File rename

A security baseline ensures

A Faster gaming
B Consistent secure setup
C Bigger storage
D Better sound

Outbound firewall rules help block

A Screen flicker
B Printer queues
C File copying
D Malware calling home

A sandbox is best used to

A Speed CPU
B Increase RAM
C Test suspicious files
D Remove cookies

A “false positive” means

A Safe file flagged
B Malware missed
C Backup deleted
D Patch failed

A “false negative” means

A Safe file flagged
B Malware not detected
C Scan faster
D Update works

Email attachments are risky mainly because they may contain

A Safe backups
B Text formatting
C Malware payload
D Screen themes

Layered security is recommended because

A One layer may fail
B It removes all risk
C It stops updates
D It needs no policy

Leave a Reply

Your email address will not be published. Required fields are marked *