Q.1 What is a phishing attack?
A fake website used to trick users
An attack that floods a network with traffic
A method of encrypting sensitive data
A way of scanning open ports
Explanation - Phishing attacks trick users into entering sensitive information on fake websites that mimic legitimate ones.
Correct answer is: A fake website used to trick users
Q.2 Which type of malware demands payment to restore user access?
Spyware
Trojan
Ransomware
Adware
Explanation - Ransomware locks or encrypts data and demands payment to restore access.
Correct answer is: Ransomware
Q.3 What does DDoS stand for?
Distributed Denial of Service
Data Denial of Service
Distributed Data over System
Digital Denial of Security
Explanation - DDoS stands for Distributed Denial of Service, where multiple systems overwhelm a target with traffic.
Correct answer is: Distributed Denial of Service
Q.4 A Trojan horse malware is named after?
A Greek myth
A type of virus
A programming error
A security tool
Explanation - Trojan horse malware is named after the Greek myth where attackers used deception to gain entry.
Correct answer is: A Greek myth
Q.5 Which attack tries every possible password combination?
Brute-force attack
Phishing
SQL injection
Man-in-the-middle
Explanation - A brute-force attack attempts all possible passwords until the correct one is found.
Correct answer is: Brute-force attack
Q.6 What is the primary goal of a man-in-the-middle attack?
Intercept communication
Encrypt data
Speed up networks
Protect against viruses
Explanation - A man-in-the-middle attack intercepts communication between two parties to steal or alter information.
Correct answer is: Intercept communication
Q.7 Which of the following is NOT a social engineering technique?
Phishing
Pretexting
Tailgating
Firewalls
Explanation - Firewalls are a defense mechanism, not a social engineering method.
Correct answer is: Firewalls
Q.8 SQL injection targets which part of an application?
Database queries
Operating system
Network cables
CPU memory
Explanation - SQL injection exploits vulnerabilities in database queries to manipulate or extract data.
Correct answer is: Database queries
Q.9 What is spyware designed to do?
Delete files
Monitor user activity
Encrypt data
Spread through networks
Explanation - Spyware secretly monitors user activity, often stealing sensitive data like passwords.
Correct answer is: Monitor user activity
Q.10 A zero-day attack exploits?
An old bug
A newly discovered vulnerability
A firewall misconfiguration
A password reuse
Explanation - Zero-day attacks exploit newly discovered vulnerabilities before they are patched.
Correct answer is: A newly discovered vulnerability
Q.11 What does ransomware typically encrypt?
User data files
Operating system code
Firewalls
Antivirus software
Explanation - Ransomware encrypts user data files to demand payment for decryption keys.
Correct answer is: User data files
Q.12 Which attack involves tricking DNS servers?
DNS spoofing
SQL injection
Phishing
Brute force
Explanation - DNS spoofing redirects traffic to malicious sites by tampering with DNS records.
Correct answer is: DNS spoofing
Q.13 Adware primarily does what?
Displays unwanted ads
Encrypts data
Steals passwords
Deletes files
Explanation - Adware displays unwanted advertisements, often slowing down systems.
Correct answer is: Displays unwanted ads
Q.14 Which type of attack relies on users using weak passwords?
Brute force
SQL injection
Trojan
Phishing
Explanation - Brute-force attacks are successful if users choose weak or common passwords.
Correct answer is: Brute force
Q.15 What is the goal of a denial-of-service attack?
Steal data
Make services unavailable
Encrypt files
Install spyware
Explanation - Denial-of-service attacks overload systems, making them unavailable to users.
Correct answer is: Make services unavailable
Q.16 What is the difference between a virus and a worm?
Viruses need a host file, worms spread independently
Worms infect files, viruses do not
Viruses spread faster than worms
They are identical
Explanation - Viruses require a host program to spread, while worms spread autonomously.
Correct answer is: Viruses need a host file, worms spread independently
Q.17 Keyloggers are used to?
Record keystrokes
Encrypt messages
Block pop-ups
Speed up systems
Explanation - Keyloggers record keystrokes to steal sensitive information like passwords.
Correct answer is: Record keystrokes
Q.18 Which attack manipulates websites into executing malicious scripts?
Cross-site scripting (XSS)
Phishing
Brute force
Trojan
Explanation - XSS injects malicious scripts into websites that run in users’ browsers.
Correct answer is: Cross-site scripting (XSS)
Q.19 Botnets are mainly used for?
Distributed attacks
Password resets
Improving speed
User authentication
Explanation - Botnets are networks of compromised computers controlled to perform attacks.
Correct answer is: Distributed attacks
Q.20 Which is an example of insider threat?
Employee stealing data
Phishing email
SQL injection
Botnet attack
Explanation - Insider threats come from trusted individuals with access to systems.
Correct answer is: Employee stealing data
Q.21 Which file type is often exploited to deliver macro viruses?
Word documents
JPEG images
MP3 files
MP4 videos
Explanation - Macro viruses are commonly embedded in Microsoft Word documents.
Correct answer is: Word documents
Q.22 Which cyber attack relies heavily on psychological manipulation?
Social engineering
DDoS
Brute force
SQL injection
Explanation - Social engineering tricks users into giving access through psychological manipulation.
Correct answer is: Social engineering
Q.23 Which malware disguises itself as legitimate software?
Trojan horse
Worm
Adware
Keylogger
Explanation - Trojan horses pretend to be legitimate programs to trick users into installing them.
Correct answer is: Trojan horse
Q.24 What is the main purpose of rootkits?
Hide malicious activity
Encrypt data
Show advertisements
Block firewalls
Explanation - Rootkits hide malicious processes and files to avoid detection.
Correct answer is: Hide malicious activity
Q.25 Which attack tricks users into clicking malicious links?
Clickjacking
Phishing
SQL injection
Man-in-the-middle
Explanation - Clickjacking hides malicious actions under normal clickable elements.
Correct answer is: Clickjacking
