NSCT – Malware & Attack Techniques MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Malware is defined as: (A) Software to speed up the internet (B) A type of firewall (C) A computer hardware device (D) Malicious software designed to harm or exploit systemsShow All AnswersShow All Answers 2. . Which of the following is NOT a type of malware? (A) Virus (B) Worm (C) Trojan (D) FirewallShow All Answers 3. . A computer virus: (A) Attaches itself to files and spreads when executed (B) Deletes the operating system automatically (C) Improves system performance (D) Blocks internet accessShow All Answers 4. . A worm: (A) Is a type of firewall (B) Only spreads through email attachments (C) Can spread automatically across networks without user intervention (D) Encrypts files onlyShow All Answers 5. . Trojan horse malware: (A) Increases internet speed (B) Only slows down computers (C) Appears legitimate but contains malicious code (D) Automatically deletes files safelyShow All Answers 6. . Ransomware is malware that: (A) Deletes system files automatically (B) Encrypts user data and demands payment for decryption (C) Spreads like a worm (D) Blocks antivirus programs onlyShow All Answers 7. . Spyware is malware that: (A) Deletes old files (B) Monitors user activity and steals sensitive information (C) Encrypts data only (D) Increases CPU speedShow All Answers 8. . Adware is: (A) An antivirus program (B) A type of firewall (C) Software that displays unwanted advertisements (D) Network security toolShow All Answers 9. . Keyloggers are malware that: (A) Increase internet speed (B) Encrypt data automatically (C) Record keystrokes to steal passwords and sensitive information (D) Compress filesShow All Answers 10. . Rootkits are malware designed to: (A) Speed up system performance (B) Encrypt files (C) Delete system logs (D) Hide the presence of malicious software and maintain privileged accessShow All Answers 11. . Which of the following is a social engineering attack? (A) Phishing (B) Trojan (C) Worm (D) VirusShow All Answers 12. . Phishing attacks aim to: (A) Block network traffic (B) Install antivirus software (C) Encrypt system files (D) Trick users into revealing sensitive information like passwordsShow All Answers 13. . Denial-of-Service (DoS) attack: (A) Deletes files automatically (B) Makes a system or network unavailable to legitimate users (C) Encrypts only emails (D) Speeds up internet connectionsShow All Answers 14. . Distributed Denial-of-Service (DDoS) attack: (A) Encrypts files (B) Increases system speed (C) Deletes malware (D) Uses multiple systems to flood a target with trafficShow All Answers 15. . Man-in-the-Middle (MITM) attack: (A) Speeds up network traffic (B) Deletes user accounts (C) Encrypts files safely (D) Intercepts communication between two partiesShow All Answers 16. . A zero-day attack exploits: (A) Network firewalls (B) Only old operating systems (C) Unknown vulnerabilities in software before patches are released (D) Antivirus programsShow All Answers 17. . SQL Injection is an attack where: (A) Internet traffic is blocked (B) Emails are deleted automatically (C) Files are encrypted (D) Malicious SQL code is inserted into input fields to manipulate databasesShow All Answers 18. . Cross-Site Scripting (XSS) attack allows: (A) Faster downloads (B) Automatic encryption of files (C) Deletion of emails (D) Execution of malicious scripts in a user's browserShow All Answers 19. . Brute force attack involves: (A) Flooding network traffic (B) Encrypting system files (C) Deleting malicious software (D) Trying all possible password combinations to gain accessShow All Answers 20. . The main goal of malware and attack techniques is to: (A) Compress data (B) Increase system speed (C) Backup files (D) Steal, damage, or disrupt information systemsShow All Answers