Cyber security refers to the protection of computer systems, networks, devices, and data from digital attacks. These attacks usually aim to steal or destroy information.
1. What is the main purpose of Cyber Security?
A. To install games
B. To protect computer and data
C. To increase internet speed
D. To delete files
Correct Answer: B
2. What does “C” stand for in the CIA Triad?
A. Control
B. Confidentiality
C. Connection
D. Cyber
Correct Answer: B
3. Which malware spreads through a network by itself?
A. Virus
B. Worm
C. Trojan
D. Bot
Correct Answer: B
4. What is a Trojan?
A. A program that spreads automatically
B. A harmful program that looks like a useful one
C. A program that encrypts data
D. A program that damages hardware
Correct Answer: B
5. Fake emails or messages asking for bank details are called?
A. Phishing
B. Spoofing
C. Sniffing
D. Spamming
Correct Answer: A
6. What does Ransomware do?
A. Increases internet speed
B. Locks the system and asks for money
C. Compresses files
D. Cleans RAM
Correct Answer: B
7. Which tool blocks unauthorized access?
A. Firewall
B. Paint
C. Notepad
D. Calculator
Correct Answer: A
8. Which one is a strong password?
A. 12345
B. name123
C. Ab@45#Xq
D. aaaaa
Correct Answer: C
9. SQL Injection attacks target which component?
A. Keyboard
B. Database
C. Printer
D. Mouse
Correct Answer: B
10. What is the goal of a DoS attack?
A. Make website faster
B. Overload server to shut it down
C. Remove viruses
D. Backup files
Correct Answer: B
11. In which attack does the hacker secretly intercept communication?
A. MITM (Man-in-the-Middle)
B. DoS attack
C. Worm attack
D. UPS attack
Correct Answer: A
12. What is the use of Antivirus software?
A. To play songs
B. To detect and remove malware
C. To restart computer
D. To turn off internet
Correct Answer: B
13. What does Encryption do?
A. Deletes data
B. Converts data into secret code
C. Changes data color
D. Renames data
Correct Answer: B
14. What does Spyware do?
A. Makes system faster
B. Secretly records user activities
C. Heats computer
D. Compresses files
Correct Answer: B
15. 2FA stands for?
A. Two Factor Authentication
B. Two File Access
C. Triple Fast Access
D. Two Free Accounts
Correct Answer: A
16. Which one is a rule of Cyber Ethics?
A. Using pirated software
B. Sharing personal data
C. Doing illegal hacking
D. Using the internet properly
Correct Answer: D
17. What is a Backdoor in Cyber Security?
A. A tool to cool the computer
B. A secret entry to bypass security
C. A tool to delete data
D. A photo editing tool
Correct Answer: B
18. Which attack tries to guess passwords?
A. Brute Force Attack
B. Phishing
C. DoS Attack
D. Spoofing
Correct Answer: A
19. Which malware installs itself without the user knowing?
A. Antivirus
B. Spyware
C. Paint
D. ZIP File
Correct Answer: B
20. What does “Availability” mean in the CIA Triad?
A. Keeping data hidden
B. Ensuring data is always accessible
C. Encrypting data
D. Deleting data
Correct Answer: B
1. A computer virus needs ______ to spread.
a) User action
b) Email only
c) Internet only
d) Printer
✔ Answer: a
2. Which malware attaches itself to a file?
a) Worm
b) Trojan
c) Virus
d) Bot
✔ Answer: c
3. A worm spreads mainly through ______.
a) Keyboard
b) Network
c) Speakers
d) Screensaver
✔ Answer: b
4. Which one is NOT a type of malware?
a) Virus
b) Firewall
c) Trojan
d) Ransomware
✔ Answer: b
5. Which malware encrypts all files and demands money?
a) Virus
b) Ransomware
c) Spyware
d) Adware
✔ Answer: b
6. Spyware secretly ______.
a) Records user activities
b) Increases internet speed
c) Formats hard disk
d) Cleans RAM
✔ Answer: a
7. Which attack sends too much traffic to a server?
a) SQL Injection
b) DoS Attack
c) Spyware
d) Brute Force
✔ Answer: b
8. Which malware looks like a legitimate software?
a) Trojan
b) Virus
c) Worm
d) Rootkit
✔ Answer: a
9. Which attack tries many passwords until it finds the correct one?
a) DoS
b) Brute Force
c) Phishing
d) Spoofing
✔ Answer: b
10. Phishing mainly targets ______.
a) Passwords
b) Keyboard
c) Printer
d) Speakers
✔ Answer: a
11. Fake websites are commonly used in ______ attack.
a) Phishing
b) Worm
c) Spyware
d) Ransomware
✔ Answer: a
12. MITM stands for ______.
a) Man Inside The Message
b) Man In The Middle
c) Machine In The Middle
d) Message In The Main
✔ Answer: b
13. Which cybersecurity goal ensures data is accurate?
a) Availability
b) Integrity
c) Confidentiality
d) Security
✔ Answer: b
14. The process of converting data into unreadable form is called?
a) Formatting
b) Encryption
c) Downloading
d) Uploading
✔ Answer: b
15. Unauthorized access to a system is called ______.
a) Hacking
b) Printing
c) Typing
d) Encrypting
✔ Answer: a
16. What is the best way to secure a Wi-Fi network?
a) Turn off computer
b) Use strong password
c) Change wallpaper
d) Increase screen brightness
✔ Answer: b
17. The strongest type of password is ______.
a) Only letters
b) Only numbers
c) Mix of letters, numbers & symbols
d) Birthdate
✔ Answer: c
18. Which one is not a password attack?
a) Dictionary attack
b) Brute force attack
c) Replay attack
d) Antivirus scan
✔ Answer: d
19. Which malware modifies system settings secretly?
a) Rootkit
b) Adware
c) Worm
d) Bot
✔ Answer: a
20. SQL Injection targets ______.
a) Database
b) Speaker
c) Monitor
d) Keyboard
✔ Answer: a
21. What is the purpose of a Firewall?
a) Remove viruses
b) Block unauthorized access
c) Play music
d) Print documents
✔ Answer: b
22. Which attack involves capturing login credentials over public Wi-Fi?
a) MITM
b) Worm
c) Spyware
d) Virus
✔ Answer: a
23. Adware mainly displays ______.
a) Ads
b) Passwords
c) Codes
d) Files
✔ Answer: a
24. The best way to prevent phishing is ______.
a) Clicking all links
b) Checking email sender
c) Using old software
d) Restarting computer
✔ Answer: b
25. A backdoor gives ______.
a) Secret access to a system
b) New wallpaper
c) Faster CPU
d) Bigger screen
✔ Answer: a
26. Which device converts plain text into cipher text?
a) Keyboard
b) Encryption software
c) Printer
d) Scanner
✔ Answer: b
27. Which attack is used to steal credit card information online?
a) Phishing
b) Worm
c) Ransomware
d) Brute force
✔ Answer: a
28. A botnet is a network of ______.
a) Infected computers
b) Printers
c) Smartphones
d) Keyboards
✔ Answer: a
29. Which software helps detect malware?
a) Antivirus
b) Notepad
c) Paint
d) VLC player
✔ Answer: a
30. Which is a simple way to increase security?
a) Using 2FA
b) Using weak passwords
c) Downloading from unknown sites
d) Ignoring updates
✔ Answer: a