Q.1 What does 'cyber security' primarily deal with?
Protecting physical property
Securing computer systems and networks
Building computer hardware
Designing video games
Explanation - Cyber security is the practice of protecting computer systems, networks, and data from digital attacks.
Correct answer is: Securing computer systems and networks
Q.2 Which of the following is an example of malware?
Firewall
Trojan horse
VPN
Encryption
Explanation - A Trojan horse is a type of malware disguised as legitimate software to trick users into installing it.
Correct answer is: Trojan horse
Q.3 What does 'phishing' mean?
Fishing with a net
Tricking people into revealing sensitive information
Encrypting messages
Protecting a computer with a password
Explanation - Phishing is a social engineering attack where attackers disguise as trustworthy entities to steal personal information.
Correct answer is: Tricking people into revealing sensitive information
Q.4 Which of these is the strongest password?
123456
qwerty
P@ssw0rd123!
password
Explanation - A strong password includes uppercase, lowercase, numbers, and special characters.
Correct answer is: P@ssw0rd123!
Q.5 What does a firewall do?
Stores passwords
Protects against physical theft
Monitors and filters network traffic
Scans for malware only
Explanation - A firewall controls incoming and outgoing network traffic based on security rules.
Correct answer is: Monitors and filters network traffic
Q.6 Which is considered a social engineering attack?
SQL injection
Phishing email
DDoS attack
Man-in-the-middle
Explanation - Phishing is a social engineering technique to trick users into sharing confidential information.
Correct answer is: Phishing email
Q.7 What is the main goal of encryption?
Speeding up networks
Making data unreadable without a key
Deleting sensitive files
Storing backups
Explanation - Encryption converts data into unreadable form to protect it from unauthorized access.
Correct answer is: Making data unreadable without a key
Q.8 Which one is an example of multi-factor authentication?
Only entering a password
Fingerprint + password
PIN only
Security question only
Explanation - Multi-factor authentication uses two or more verification methods, such as a password and a fingerprint.
Correct answer is: Fingerprint + password
Q.9 What does 'DDoS' stand for?
Distributed Denial of Service
Digital Download of Software
Data Division over Systems
Direct Domain of Servers
Explanation - A DDoS attack overwhelms a server with traffic from multiple sources, causing disruption.
Correct answer is: Distributed Denial of Service
Q.10 Which of the following is a type of cyber attack?
Phishing
Vaccination
Debugging
Programming
Explanation - Phishing is a type of cyber attack where attackers impersonate trusted entities.
Correct answer is: Phishing
Q.11 Which of these is a secure protocol for web communication?
HTTP
FTP
HTTPS
SMTP
Explanation - HTTPS (HyperText Transfer Protocol Secure) encrypts communication between browsers and servers.
Correct answer is: HTTPS
Q.12 What is the main purpose of a VPN?
To block viruses
To increase download speed
To create a secure, private network connection
To store files
Explanation - A VPN encrypts internet traffic and hides your IP address, making browsing more private.
Correct answer is: To create a secure, private network connection
Q.13 Which type of malware locks files and demands ransom?
Spyware
Adware
Ransomware
Worm
Explanation - Ransomware encrypts data and demands payment for its release.
Correct answer is: Ransomware
Q.14 What does 'CIA' stand for in cyber security?
Central Intelligence Agency
Confidentiality, Integrity, Availability
Cyber Information Act
Critical Internet Access
Explanation - CIA triad represents the three core principles of cyber security.
Correct answer is: Confidentiality, Integrity, Availability
Q.15 Which of these is an example of strong cyber hygiene?
Using the same password everywhere
Ignoring software updates
Regularly updating antivirus
Clicking unknown links
Explanation - Updating antivirus helps protect against the latest threats.
Correct answer is: Regularly updating antivirus
Q.16 What is two-factor authentication (2FA)?
Using two firewalls
Using two different devices
Using two verification methods
Using two passwords only
Explanation - 2FA requires two different ways to verify identity, increasing account security.
Correct answer is: Using two verification methods
Q.17 Which attack involves secretly listening to network communications?
Phishing
Eavesdropping
Spoofing
Rootkit
Explanation - Eavesdropping attacks capture and monitor network communications without permission.
Correct answer is: Eavesdropping
Q.18 What is a zero-day attack?
An attack that lasts zero seconds
An attack exploiting a previously unknown vulnerability
A failed attack
An attack on the first day of the year
Explanation - Zero-day attacks exploit vulnerabilities before developers release patches.
Correct answer is: An attack exploiting a previously unknown vulnerability
Q.19 Which is an example of biometric authentication?
PIN
Fingerprint
Password
Security question
Explanation - Biometric authentication uses unique biological traits like fingerprints or facial recognition.
Correct answer is: Fingerprint
Q.20 Which term refers to disguising malicious code within normal code?
Obfuscation
Decryption
Debugging
Compression
Explanation - Obfuscation hides malicious intent by making code harder to understand.
Correct answer is: Obfuscation
Q.21 What is spyware designed to do?
Protect your data
Encrypt files
Steal user information secretly
Destroy hardware
Explanation - Spyware monitors user activity and steals sensitive information without consent.
Correct answer is: Steal user information secretly
Q.22 What is the role of an Intrusion Detection System (IDS)?
Blocking malware
Detecting unauthorized activities in networks
Encrypting data
Backing up data
Explanation - IDS monitors systems and networks for malicious or suspicious activity.
Correct answer is: Detecting unauthorized activities in networks
Q.23 Which is NOT an example of malware?
Virus
Worm
Firewall
Trojan
Explanation - Firewall is a security measure, not malware.
Correct answer is: Firewall
Q.24 Which of these is an ethical hacking practice?
Phishing for data
Performing penetration testing
Spreading worms
Creating ransomware
Explanation - Ethical hackers test systems legally to identify and fix vulnerabilities.
Correct answer is: Performing penetration testing
Q.25 What is the purpose of hashing in cyber security?
To speed up file transfers
To convert data into a fixed-length value
To compress data
To encrypt passwords only
Explanation - Hashing creates unique values for data integrity verification, often used for passwords.
Correct answer is: To convert data into a fixed-length value
