1. Which type of attack involves sending deceptive emails to reveal sensitive information, including passwords?
a) Brute force attack
b) Phishing attack
c) Dictionary attack
d) Rainbow table attack
2. A malicious code hidden inside a seemingly harmless code is called malicious code.
a) Worm
b) Bomb
c) Trojan Horse
d) Virus
3. What is the name of viruses that force users to download and execute applications pretending to be useful?
a) Kayaker
b) Worm
c) Trojan Horse
d) Keylogger
4. Which of the following is a type of software that contains self-replicating software that replicates files and systems?
a) Virus
b) Trojan Horse
c) Bots
d) Vamrse
5. What does HTTPS mean in a website URL?
a) Hyper Text Transfer Protocol Secure
b) Hyper Text Transfer Protocol Stand
c) SHyper Text Transmission Protocol Secure
d) Hyper Text Transfer Policy and Secure
6. A website URL that begins with https:// and includes a padlock icon in the address bar indicates that
a) The website uses outdated security protocols
b) A secure connection with website encryption
c) The website is safe from all types of cyber threats
d) The website is offline
7. Full form of VPN is?
a) Virtual Private Network
b) Very Private Navigator
c) Verified Public Network
d) Visual Proxy Network
8. What are the uses of firewall?
a) Filters packets coming from the Internet
b) Filtering packets coming from the Internet
c) Filtering packets transmitted over the Internet
d) Packet Faster Traffic for faster e-commerce
9. Distributed denial-of-service (DOS) attacks are aimed at
a)GAINING unauthorized access to a system
b)Malicious software on computer
c) Fills the system with traffic
d) Encrypting the file and demanding ransom
10. Which of the following is an independent malicious program that does not require any host program?
a) Virus
b) Logic bomb
c) Worm
d) Trap doors
11. What is the purpose of regularly clearing browser cache and cookies for safe browsing?
a) Increasing website performance
b) Deleting saved passwords
c) Websites monitor user activity
d) Disabling browser extensions
12. When hackers flood a website with useless traffic to put pressure on the network, it is called.
a) DoS attacks
b) Spoofing
c) Fishing
d) None of the above
13. Who among the following monitors the activities of users on the Internet and transmits it to someone else?
a) Adware
b) Spyware
c) malwareMaleware
d) None of the above
14. Which virus sent people emails with the subject I LOVE YOU in the year 2000?
a) Love Letter
b) Lovebug
c) Valentine connection
d) Darling Link
15. Which of the following is a common security feature found in reputable online payment portals?
Request for payment in cryptocurrency only
a) Using HTTP instead of HTTPS
b) TwoTwo Factor Authentication for User Accounts
c) Pop up ads during payment process
d) None of the above
16. What is the primary goal of a credential phishing attack?
a) Installing malware on a device
b) intercepting the password during transmission
c) gaining unauthorized access to a network
d) Obtaining sensitive information like user name and password.
17. Malicious programs that do not replicate automatically are called
a) Trojan Horse
b) Worm
c) Zombie
d) Virus
18. What is it called when a person tries to harm a group of people by using a computer?
a) Cracker
b) Social Engineer
c) Cyber Terrorist
d) Wide Hat Intruder
19. What are keyloggers in the context of password attacks?
a) Software that generates random passwords.
b) MaliciousMalicious software that harms someone softwarethat causes harm to someone
c) aA tool to crack password hash tool for cracking password hashes
d) A type of phishing attack
20. What is the primary target of a man-in-the-middle (MITM) attack?
a) stealing personal information
b) Intercepting or altering communications between two parties
c) Overloading a system with traffic Deleting files from a computer
d) None of the above
21. Which computer virus records every activity happening on your computer?
a) DOS
b) malware android
c) Trapper
d) Keylogger
22. What does the presence of www in a website URL indicate?
a) Websites are more reliable
b) Websites are using old technology
c) The website is less secure
d) This is just a naming convention and is meant for security.
23. Was there a virus which was first found on ARPANET?
a) Creeper
b) Stuxnet
c) Concept
d) None of the above