Basic Computer Security and Cyber Threats MCQs

By: Prof. Dr. Fazal Rehman Shamil | Last updated: September 28, 2024

What is computer security?
A) The protection of computer systems and data from theft, damage, or unauthorized access
B) A type of software
C) A programming language
D) A hardware component
Answer: A

What is a cyber threat?
A) Any potential danger to computer systems or networks
B) A type of virus
C) A security software
D) A computer hardware
Answer: A

What is malware?
A) Malicious software designed to harm or exploit any programmable device or network
B) A type of computer hardware
C) A security protocol
D) A software update
Answer: A

Which of the following is a common type of malware?
A) Virus
B) Worm
C) Trojan horse
D) All of the above
Answer: D

What is a phishing attack?
A) An attempt to acquire sensitive information by masquerading as a trustworthy entity
B) A type of malware
C) A software update
D) A firewall
Answer: A

What is a firewall?
A) A security device that monitors and controls incoming and outgoing network traffic
B) A type of malware
C) A hardware component
D) A programming language
Answer: A

What is a DDoS attack?
A) A Distributed Denial of Service attack that aims to make a service unavailable
B) A type of virus
C) A security software
D) A computer hardware
Answer: A

What does encryption do?
A) Converts data into a coded format to prevent unauthorized access
B) Deletes unnecessary files
C) Creates backups
D) Increases data speed
Answer: A

What is two-factor authentication (2FA)?
A) A security process that requires two forms of identification before granting access
B) A type of malware
C) A software update
D) A programming language
Answer: A

What is social engineering in the context of cyber security?
A) Manipulating individuals into divulging confidential information
B) A type of malware
C) A security protocol
D) A programming technique
Answer: A

What is ransomware?
A) A type of malware that encrypts files and demands payment for their release
B) A security software
C) A hardware component
D) A programming language
Answer: A

What is a Trojan horse?
A) A type of malware that disguises itself as legitimate software
B) A security protocol
C) A firewall
D) A type of encryption
Answer: A

What is a data breach?
A) An incident where unauthorized access to confidential data occurs
B) A type of virus
C) A security protocol
D) A programming error
Answer: A

What is a security patch?
A) A software update designed to fix vulnerabilities
B) A type of malware
C) A hardware component
D) A programming language
Answer: A

What is an intrusion detection system (IDS)?
A) A system that monitors network traffic for suspicious activity
B) A type of malware
C) A security software
D) A computer hardware
Answer: A

What is a VPN (Virtual Private Network)?
A) A service that encrypts your internet connection for security and privacy
B) A type of malware
C) A programming language
D) A computer hardware
Answer: A

What does the term “zero-day exploit” refer to?
A) A vulnerability that is exploited before the vendor releases a patch
B) A type of virus
C) A software update
D) A security protocol
Answer: A

What is the purpose of anti-virus software?
A) To detect and remove malware from a computer
B) To increase internet speed
C) To backup data
D) To create firewalls
Answer: A

What is a brute force attack?
A) A method of cracking passwords by trying all possible combinations
B) A type of malware
C) A security protocol
D) A programming technique
Answer: A

What is the role of a cybersecurity analyst?
A) To protect an organization’s computer systems and networks
B) To write software code
C) To create hardware components
D) To manage databases
Answer: A

What is a security policy?
A) A document that outlines an organization’s security measures and protocols
B) A type of malware
C) A programming technique
D) A software update
Answer: A

What is a botnet?
A) A network of infected devices controlled by a malicious actor
B) A type of malware
C) A computer hardware
D) A software update
Answer: A

What does “patch management” involve?
A) The process of managing updates for software applications
B) A type of malware
C) A hardware component
D) A programming technique
Answer: A

What is spear phishing?
A) A targeted attempt to steal sensitive information from a specific individual
B) A type of malware
C) A security protocol
D) A programming technique
Answer: A

What is the purpose of a password manager?
A) To securely store and manage passwords
B) To delete unnecessary files
C) To encrypt data
D) To create backups
Answer: A

What is an exploit?
A) A piece of software or code that takes advantage of a vulnerability
B) A type of malware
C) A security protocol
D) A hardware component
Answer: A

What is the main goal of penetration testing?
A) To identify vulnerabilities in a system by simulating an attack
B) To write software code
C) To create hardware components
D) To manage databases
Answer: A

What is the significance of strong passwords?
A) They help protect accounts from unauthorized access
B) They increase internet speed
C) They create backups
D) They are easier to remember
Answer: A

What is a phishing email?
A) An email designed to trick the recipient into providing sensitive information
B) A type of malware
C) A programming technique
D) A hardware component
Answer: A

What does the term “network security” refer to?
A) The measures taken to protect data during transfer over networks
B) A type of malware
C) A programming language
D) A software update
Answer: A

What is a risk assessment in cybersecurity?
A) The process of identifying and evaluating potential risks to an organization
B) A type of malware
C) A programming technique
D) A security protocol
Answer: A

What is an ethical hacker?
A) A security professional who tests systems for vulnerabilities legally
B) A type of malware
C) A programming technique
D) A hardware component
Answer: A

What is the purpose of cybersecurity training for employees?
A) To educate staff about security risks and best practices
B) To increase data storage
C) To create backups
D) To write software code
Answer: A

What is the significance of data loss prevention (DLP)?
A) To protect sensitive information from being lost or misused
B) A type of malware
C) A programming language
D) A hardware component
Answer: A

What is a cyber incident response plan?
A) A strategy for responding to cybersecurity incidents
B) A type of malware
C) A programming technique
D) A hardware component
Answer: A

What is a keylogger?
A) A type of malware that records keystrokes to capture sensitive information
B) A security software
C) A programming technique
D) A hardware component
Answer: A

What is a risk factor in cybersecurity?
A) Any condition that increases the likelihood of a cyber incident
B) A type of malware
C) A programming language
D) A software update
Answer: A

What is the main function of a security token?
A) To provide an additional layer of authentication
B) A type of malware
C) A programming technique
D) A hardware component
Answer: A

What is the role of encryption in securing data?
A) To protect data by converting it into a coded format
B) To delete unnecessary files
C) To create backups
D) To increase data speed
Answer: A

What does ‘social engineering’ involve?
A) Manipulating people to obtain confidential information
B) A type of malware
C) A security protocol
D) A programming technique
Answer: A