Q.1 Which of the following is considered a strong password?
12345678
password
P@ssw0rd2025!
abcdef
Explanation - A strong password combines uppercase, lowercase, numbers, and special characters.
Correct answer is: P@ssw0rd2025!
Q.2 What does SSL stand for in cybersecurity?
Secure Socket Layer
System Security Layer
Secure System Login
Security Software Link
Explanation - SSL encrypts data transmitted between a browser and a server to ensure secure communication.
Correct answer is: Secure Socket Layer
Q.3 Phishing attacks primarily aim to:
Steal sensitive information
Install antivirus software
Update system firmware
Improve network speed
Explanation - Phishing uses deceptive emails or websites to trick users into revealing passwords, credit card numbers, etc.
Correct answer is: Steal sensitive information
Q.4 Two-factor authentication (2FA) provides security by:
Requiring only a password
Requiring two forms of verification
Blocking all suspicious IPs
Encrypting files on a disk
Explanation - 2FA combines something you know (password) and something you have (OTP, token) to increase security.
Correct answer is: Requiring two forms of verification
Q.5 Which of the following is a type of malware that demands ransom?
Spyware
Adware
Ransomware
Rootkit
Explanation - Ransomware encrypts files and demands payment for decryption.
Correct answer is: Ransomware
Q.6 What is the main purpose of a firewall?
Scan for viruses
Block unauthorized network access
Store backup data
Monitor CPU usage
Explanation - A firewall filters incoming and outgoing network traffic based on security rules.
Correct answer is: Block unauthorized network access
Q.7 In cybersecurity, what is 'social engineering'?
Hacking into social media accounts
Tricking people to divulge confidential info
Installing anti-virus software
Analyzing network traffic
Explanation - Social engineering manipulates humans rather than exploiting technical vulnerabilities.
Correct answer is: Tricking people to divulge confidential info
Q.8 Which of the following is a common method used to protect data at rest?
Encryption
Phishing
Spoofing
DDoS attack
Explanation - Encryption converts data into unreadable form for unauthorized users.
Correct answer is: Encryption
Q.9 Which one of these is an example of biometric authentication?
PIN code
Fingerprint scan
Security question
Password hint
Explanation - Biometric authentication uses physical characteristics like fingerprints or retina scans.
Correct answer is: Fingerprint scan
Q.10 A DDoS attack primarily targets:
Individual emails
Network or website availability
Password strength
Local storage devices
Explanation - DDoS (Distributed Denial of Service) overwhelms servers to make services unavailable.
Correct answer is: Network or website availability
Q.11 Which of the following is a legal act to protect computer systems in India?
Indian Penal Code
Information Technology Act, 2000
Consumer Protection Act
Companies Act
Explanation - The IT Act 2000 addresses cybercrime and electronic commerce in India.
Correct answer is: Information Technology Act, 2000
Q.12 Which is the safest method for online transactions?
Public Wi-Fi without VPN
HTTPS websites
Sharing card details via email
Using weak passwords
Explanation - HTTPS ensures encryption of data transmitted between user and website.
Correct answer is: HTTPS websites
Q.13 Spyware is designed to:
Steal sensitive information secretly
Enhance system performance
Block unauthorized access
Protect against malware
Explanation - Spyware monitors user activities without consent and transmits data to attackers.
Correct answer is: Steal sensitive information secretly
Q.14 Which of the following is NOT a type of malware?
Virus
Trojan
Router
Worm
Explanation - A router is a networking device, not malware.
Correct answer is: Router
Q.15 Ethical hacking is performed to:
Exploit systems illegally
Identify vulnerabilities to secure systems
Steal confidential data
Install malware for fun
Explanation - Ethical hackers test systems to strengthen security, following legal and ethical guidelines.
Correct answer is: Identify vulnerabilities to secure systems
Q.16 Which of the following protocols is used for secure email communication?
SMTP
HTTPS
POP3S/IMAPS
FTP
Explanation - POP3S and IMAPS encrypt email communication, unlike plain POP3/IMAP.
Correct answer is: POP3S/IMAPS
Q.17 Which cybercrime involves unauthorized copying or distribution of software?
Piracy
Phishing
Ransomware
Keylogging
Explanation - Software piracy is illegal reproduction and distribution without permission.
Correct answer is: Piracy
Q.18 Which of the following is considered a safe browsing practice?
Clicking on unknown links
Visiting HTTPS websites only
Using weak passwords
Sharing credentials publicly
Explanation - HTTPS encrypts data and ensures authenticity of the website.
Correct answer is: Visiting HTTPS websites only
Q.19 Zero-day vulnerability refers to:
A bug known but not fixed
A virus that spreads in zero seconds
Unauthorized network access
Expired SSL certificates
Explanation - Zero-day vulnerabilities are unknown to vendors and can be exploited before a patch is available.
Correct answer is: A bug known but not fixed
Q.20 Which of the following is an example of two-factor authentication?
Username and password
Password and OTP sent to mobile
Security question only
PIN code only
Explanation - Two-factor authentication requires two independent methods of verification.
Correct answer is: Password and OTP sent to mobile
Q.21 Which is an example of a strong encryption standard?
AES
DES
ROT13
Base64
Explanation - AES (Advanced Encryption Standard) is widely used for secure data encryption.
Correct answer is: AES
Q.22 Firewall rules are primarily used to:
Filter network traffic
Encrypt files
Recover deleted data
Monitor CPU usage
Explanation - Firewalls control network access by filtering traffic based on security rules.
Correct answer is: Filter network traffic
Q.23 Which of these is considered a social engineering attack?
Phishing email
Antivirus update
Firewall configuration
Two-factor authentication
Explanation - Phishing emails manipulate users into providing sensitive information.
Correct answer is: Phishing email
Q.24 Which of the following best describes a VPN?
Virtual Private Network
Virus Protection Network
Verified Password Node
Virtual Password Notifier
Explanation - A VPN encrypts internet traffic and masks your IP to protect privacy.
Correct answer is: Virtual Private Network
