Cyber Threats and Attacks # MCQs Practice set

Q.1 What is a phishing attack?

A fake website used to trick users
An attack that floods a network with traffic
A method of encrypting sensitive data
A way of scanning open ports
Explanation - Phishing attacks trick users into entering sensitive information on fake websites that mimic legitimate ones.
Correct answer is: A fake website used to trick users

Q.2 Which type of malware demands payment to restore user access?

Spyware
Trojan
Ransomware
Adware
Explanation - Ransomware locks or encrypts data and demands payment to restore access.
Correct answer is: Ransomware

Q.3 What does DDoS stand for?

Distributed Denial of Service
Data Denial of Service
Distributed Data over System
Digital Denial of Security
Explanation - DDoS stands for Distributed Denial of Service, where multiple systems overwhelm a target with traffic.
Correct answer is: Distributed Denial of Service

Q.4 A Trojan horse malware is named after?

A Greek myth
A type of virus
A programming error
A security tool
Explanation - Trojan horse malware is named after the Greek myth where attackers used deception to gain entry.
Correct answer is: A Greek myth

Q.5 Which attack tries every possible password combination?

Brute-force attack
Phishing
SQL injection
Man-in-the-middle
Explanation - A brute-force attack attempts all possible passwords until the correct one is found.
Correct answer is: Brute-force attack

Q.6 What is the primary goal of a man-in-the-middle attack?

Intercept communication
Encrypt data
Speed up networks
Protect against viruses
Explanation - A man-in-the-middle attack intercepts communication between two parties to steal or alter information.
Correct answer is: Intercept communication

Q.7 Which of the following is NOT a social engineering technique?

Phishing
Pretexting
Tailgating
Firewalls
Explanation - Firewalls are a defense mechanism, not a social engineering method.
Correct answer is: Firewalls

Q.8 SQL injection targets which part of an application?

Database queries
Operating system
Network cables
CPU memory
Explanation - SQL injection exploits vulnerabilities in database queries to manipulate or extract data.
Correct answer is: Database queries

Q.9 What is spyware designed to do?

Delete files
Monitor user activity
Encrypt data
Spread through networks
Explanation - Spyware secretly monitors user activity, often stealing sensitive data like passwords.
Correct answer is: Monitor user activity

Q.10 A zero-day attack exploits?

An old bug
A newly discovered vulnerability
A firewall misconfiguration
A password reuse
Explanation - Zero-day attacks exploit newly discovered vulnerabilities before they are patched.
Correct answer is: A newly discovered vulnerability

Q.11 What does ransomware typically encrypt?

User data files
Operating system code
Firewalls
Antivirus software
Explanation - Ransomware encrypts user data files to demand payment for decryption keys.
Correct answer is: User data files

Q.12 Which attack involves tricking DNS servers?

DNS spoofing
SQL injection
Phishing
Brute force
Explanation - DNS spoofing redirects traffic to malicious sites by tampering with DNS records.
Correct answer is: DNS spoofing

Q.13 Adware primarily does what?

Displays unwanted ads
Encrypts data
Steals passwords
Deletes files
Explanation - Adware displays unwanted advertisements, often slowing down systems.
Correct answer is: Displays unwanted ads

Q.14 Which type of attack relies on users using weak passwords?

Brute force
SQL injection
Trojan
Phishing
Explanation - Brute-force attacks are successful if users choose weak or common passwords.
Correct answer is: Brute force

Q.15 What is the goal of a denial-of-service attack?

Steal data
Make services unavailable
Encrypt files
Install spyware
Explanation - Denial-of-service attacks overload systems, making them unavailable to users.
Correct answer is: Make services unavailable

Q.16 What is the difference between a virus and a worm?

Viruses need a host file, worms spread independently
Worms infect files, viruses do not
Viruses spread faster than worms
They are identical
Explanation - Viruses require a host program to spread, while worms spread autonomously.
Correct answer is: Viruses need a host file, worms spread independently

Q.17 Keyloggers are used to?

Record keystrokes
Encrypt messages
Block pop-ups
Speed up systems
Explanation - Keyloggers record keystrokes to steal sensitive information like passwords.
Correct answer is: Record keystrokes

Q.18 Which attack manipulates websites into executing malicious scripts?

Cross-site scripting (XSS)
Phishing
Brute force
Trojan
Explanation - XSS injects malicious scripts into websites that run in users’ browsers.
Correct answer is: Cross-site scripting (XSS)

Q.19 Botnets are mainly used for?

Distributed attacks
Password resets
Improving speed
User authentication
Explanation - Botnets are networks of compromised computers controlled to perform attacks.
Correct answer is: Distributed attacks

Q.20 Which is an example of insider threat?

Employee stealing data
Phishing email
SQL injection
Botnet attack
Explanation - Insider threats come from trusted individuals with access to systems.
Correct answer is: Employee stealing data

Q.21 Which file type is often exploited to deliver macro viruses?

Word documents
JPEG images
MP3 files
MP4 videos
Explanation - Macro viruses are commonly embedded in Microsoft Word documents.
Correct answer is: Word documents

Q.22 Which cyber attack relies heavily on psychological manipulation?

Social engineering
DDoS
Brute force
SQL injection
Explanation - Social engineering tricks users into giving access through psychological manipulation.
Correct answer is: Social engineering

Q.23 Which malware disguises itself as legitimate software?

Trojan horse
Worm
Adware
Keylogger
Explanation - Trojan horses pretend to be legitimate programs to trick users into installing them.
Correct answer is: Trojan horse

Q.24 What is the main purpose of rootkits?

Hide malicious activity
Encrypt data
Show advertisements
Block firewalls
Explanation - Rootkits hide malicious processes and files to avoid detection.
Correct answer is: Hide malicious activity

Q.25 Which attack tricks users into clicking malicious links?

Clickjacking
Phishing
SQL injection
Man-in-the-middle
Explanation - Clickjacking hides malicious actions under normal clickable elements.
Correct answer is: Clickjacking