COMPUTER SECURITY & CYBER THREATS – 20 QUESTIONS
Question 1
What is a Computer Virus?
(a) Hardware component
(b) Malicious software that replicates itself and spreads to other files
(c) Antivirus software
(d) Operating system error
Question 2
Firewall is used for:
(a) Cooling the computer
(b) Protecting the network from unauthorized access
(c) Increasing internet speed
(d) Data backup
Question 3
Malware stands for:
(a) Major Software
(b) Malicious Software
(c) Manual Software
(d) Mandatory Software
Question 4
Which of the following is an example of malware?
(a) MS Word
(b) Google Chrome
(c) Trojan Horse
(d) Windows 11
Question 5
Phishing is:
(a) A fishing game
(b) A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
(c) A type of firewall
(d) An encryption method
Question 6
Antivirus software is used to:
(a) Create viruses
(b) Spread viruses
(c) Detect, prevent, and remove malware
(d) Speed up computer
Question 7
Which was the first computer virus?
(a) ILOVEYOU
(b) Melissa
(c) Creeper
(d) Morris Worm
Question 8
Ransomware is:
(a) Software that encrypts data and demands payment for decryption
(b) Free software
(c) System software
(d) Antivirus software
Question 9
Spyware is designed to:
(a) Improve system performance
(b) Monitor user activities and steal information secretly
(c) Clean temporary files
(d) Update software
Question 10
Which port is commonly used by HTTPS for secure communication?
(a) 80
(b) 21
(c) 443
(d) 25
Question 11
Two-Factor Authentication (2FA) adds:
(a) Two passwords
(b) An extra layer of security requiring two forms of verification
(c) Two antivirus programs
(d) Two firewalls
Question 12
What does VPN stand for?
(a) Virtual Private Network
(b) Very Private Network
(c) Virtual Public Network
(d) Verified Private Network
Question 13
A Trojan Horse is:
(a) A type of computer
(b) Malicious software disguised as legitimate software
(c) An antivirus
(d) A hardware device
Question 14
DDoS attack stands for:
(a) Distributed Denial of Service
(b) Direct Denial of Service
(c) Digital Denial of System
(d) Data Denial of Service
Question 15
Which of the following is the strongest password?
(a) password123
(b) 12345678
(c) MyName2025
(d) P@ssW0rd#2025!Xy
Question 16
SSL certificate is used for:
(a) Downloading files
(b) Encrypting data transferred between web browser and server
(c) Installing software
(d) Deleting cookies
Question 17
What is social engineering in cybersecurity?
(a) Building social networks
(b) Manipulating people to divulge confidential information
(c) Engineering software
(d) Network configuration
Question 18
Worm differs from Virus because:
(a) Worm is harmless
(b) Worm can self-replicate without needing a host file
(c) Worm is faster
(d) Worm only affects mobile phones
Question 19
Encryption converts:
(a) Files to folders
(b) Plaintext to ciphertext
(c) Images to videos
(d) Text to audio
Question 20
Which of the following is a good cybersecurity practice?
(a) Using same password for all accounts
(b) Clicking on email links from unknown senders
(c) Regularly updating software and using strong, unique passwords
(d) Disabling antivirus to speed up computer
ANSWER KEY
| Question No. | Correct Answer | Quick Reference |
|---|---|---|
| 1 | (b) | Virus Definition |
| 2 | (b) | Firewall |
| 3 | (b) | Malware |
| 4 | (c) | Malware Example |
| 5 | (b) | Phishing |
| 6 | (c) | Antivirus |
| 7 | (c) | First Virus |
| 8 | (a) | Ransomware |
| 9 | (b) | Spyware |
| 10 | (c) | HTTPS Port |
| 11 | (b) | 2FA |
| 12 | (a) | VPN |
| 13 | (b) | Trojan Horse |
| 14 | (a) | DDoS |
| 15 | (d) | Strong Password |
| 16 | (b) | SSL Certificate |
| 17 | (b) | Social Engineering |
| 18 | (b) | Worm vs Virus |
| 19 | (b) | Encryption |
| 20 | (c) | Best Practice |