Set No -07: COMPUTER GENERAL KNOWLEDGE QUIZ

COMPUTER SECURITY & CYBER THREATS – 20 QUESTIONS

Question 1

What is a Computer Virus?

(a) Hardware component
(b) Malicious software that replicates itself and spreads to other files
(c) Antivirus software
(d) Operating system error


Question 2

Firewall is used for:

(a) Cooling the computer
(b) Protecting the network from unauthorized access
(c) Increasing internet speed
(d) Data backup


Question 3

Malware stands for:

(a) Major Software
(b) Malicious Software
(c) Manual Software
(d) Mandatory Software


Question 4

Which of the following is an example of malware?

(a) MS Word
(b) Google Chrome
(c) Trojan Horse
(d) Windows 11


Question 5

Phishing is:

(a) A fishing game
(b) A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
(c) A type of firewall
(d) An encryption method


Question 6

Antivirus software is used to:

(a) Create viruses
(b) Spread viruses
(c) Detect, prevent, and remove malware
(d) Speed up computer


Question 7

Which was the first computer virus?

(a) ILOVEYOU
(b) Melissa
(c) Creeper
(d) Morris Worm


Question 8

Ransomware is:

(a) Software that encrypts data and demands payment for decryption
(b) Free software
(c) System software
(d) Antivirus software


Question 9

Spyware is designed to:

(a) Improve system performance
(b) Monitor user activities and steal information secretly
(c) Clean temporary files
(d) Update software


Question 10

Which port is commonly used by HTTPS for secure communication?

(a) 80
(b) 21
(c) 443
(d) 25


Question 11

Two-Factor Authentication (2FA) adds:

(a) Two passwords
(b) An extra layer of security requiring two forms of verification
(c) Two antivirus programs
(d) Two firewalls


Question 12

What does VPN stand for?

(a) Virtual Private Network
(b) Very Private Network
(c) Virtual Public Network
(d) Verified Private Network


Question 13

A Trojan Horse is:

(a) A type of computer
(b) Malicious software disguised as legitimate software
(c) An antivirus
(d) A hardware device


Question 14

DDoS attack stands for:

(a) Distributed Denial of Service
(b) Direct Denial of Service
(c) Digital Denial of System
(d) Data Denial of Service


Question 15

Which of the following is the strongest password?

(a) password123
(b) 12345678
(c) MyName2025
(d) P@ssW0rd#2025!Xy


Question 16

SSL certificate is used for:

(a) Downloading files
(b) Encrypting data transferred between web browser and server
(c) Installing software
(d) Deleting cookies


Question 17

What is social engineering in cybersecurity?

(a) Building social networks
(b) Manipulating people to divulge confidential information
(c) Engineering software
(d) Network configuration


Question 18

Worm differs from Virus because:

(a) Worm is harmless
(b) Worm can self-replicate without needing a host file
(c) Worm is faster
(d) Worm only affects mobile phones


Question 19

Encryption converts:

(a) Files to folders
(b) Plaintext to ciphertext
(c) Images to videos
(d) Text to audio


Question 20

Which of the following is a good cybersecurity practice?

(a) Using same password for all accounts
(b) Clicking on email links from unknown senders
(c) Regularly updating software and using strong, unique passwords
(d) Disabling antivirus to speed up computer



ANSWER KEY

Question No.Correct AnswerQuick Reference
1(b)Virus Definition
2(b)Firewall
3(b)Malware
4(c)Malware Example
5(b)Phishing
6(c)Antivirus
7(c)First Virus
8(a)Ransomware
9(b)Spyware
10(c)HTTPS Port
11(b)2FA
12(a)VPN
13(b)Trojan Horse
14(a)DDoS
15(d)Strong Password
16(b)SSL Certificate
17(b)Social Engineering
18(b)Worm vs Virus
19(b)Encryption
20(c)Best Practice

Leave a Reply

Your email address will not be published. Required fields are marked *