Cyber Security Threats and Challenges in Pakistan 50 Score: 0 Attempted: 0/50 Subscribe 1. : Which Pakistani government body is primarily responsible for national cyber security policy? (A) Pakistan Telecommunication Authority (PTA) (B) Federal Investigation Agency (FIA) (C) Pakistan Computer Emergency Response Team (PakCERT) (D) Ministry of Information Technology & Telecommunication 2. : What is the most common cyber threat faced by Pakistani businesses? (A) Ransomware (B) Distributed Denial of Service (DDoS) (C) Supplyâchain attacks (D) Advanced Persistent Threats (APTs) 3. : Which sector in Pakistan has seen a rapid rise in cyber attacks due to digital banking? (A) Agricultural sector (B) Banking and financial services (C) Manufacturing industry (D) Textile industry 4. : What type of cybercrime involves sending deceptive emails to trick users into revealing information? (A) Social engineering (B) Phishing (C) Malware injection (D) SQL injection 5. : Which organization in Pakistan provides cyber security training and awareness programs? (A) NADRA (B) Pakistan Telecommunication Authority (C) Pakistan Cyber Crime Reporting Center (PCCRC) (D) Pakistan Institute of Cyber Security (PICS) 6. : What is a major challenge for rural Pakistan in cyber security? (A) Lack of mobile phones (B) Poor internet infrastructure (C) Over-regulation (D) High literacy rates 7. : PKR is often targeted by cybercriminals because it’s the national currency code of Pakistan, but what kind of threat refers to stealing cryptocurrency wallets? (A) Cryptojacking (B) Ransomware (C) ATM Skimming (D) Phishing 8. : Which law governs cyber crimes in Pakistan? (A) Prevention of Electronic Crimes Act (PECA) (B) Pakistan Penal Code (PPC) (C) Cyber Security Act (D) Digital Evidence Act 9. : What kind of attack floods a server with traffic to disrupt services? (A) Trojan (B) DDoS (C) Keylogger (D) Spyware 10. : What is an insider threat? (A) External hackers stealing data (B) Malicious or negligent staff causing security breaches (C) Government surveillance (D) Distributed denialâofâservice attack 11. : Why are small and medium enterprises (SMEs) in Pakistan vulnerable to cyber threats? (A) Over-budget cybersecurity teams (B) Limited cybersecurity investment (C) Excessive regulation (D) High infrastructure 12. : Which challenge specifically affects Pakistanâs e-commerce platforms? (A) Lack of customers (B) Payment gateway vulnerabilities (C) Lack of mobile access (D) Poor localization 13. : What type of malware encrypts user data until a ransom is paid? (A) Ransomware (B) Adware (C) Spyware (D) Worm 14. : The “man-in-the-middle” attack is an example of a threat to: (A) Physical security (B) Network communication (C) Software licensing (D) Supply chain 15. : A key vulnerability in Pakistanâs smart energy grids is: (A) Mechanical breakdown (B) Lack of cyber hygiene and network protection (C) Too much manual operation (D) Overstaffing 16. : Which year did Pakistan enact PECA? (A) 2007 (B) 2015 (C) 2002 (D) 2020 17. : What does twoâfactor authentication (2FA) help prevent? (A) Traffic interception (B) Unauthorized access (C) Spyware installation (D) Worm propagation 18. : Which of the following is a common cyber threat to Pakistanâs national security institutions? (A) Identity theft (B) APT infiltration (C) DDoS on local blogs (D) Adware 19. : What is meant by âcyber hygieneâ? (A) Cleaning physical servers (B) Keeping software, passwords, and practices updated (C) Wiping servers weekly (D) Using antivirus only 20. : Pakistanâs telecom industry was targeted by what type of threat in recent years? (A) ATM skimming (B) Signaling system 7 (SS7) vulnerabilities (C) Physical break-ins (D) Airâgapped networks being tapped 21. : What is the core threat to Pakistanâs healthcare data systems? (A) Phishing campaigns on staff (B) Earthquakes (C) Water shortage (D) Electrical surges 22. : Which challenge hampers Pakistanâs national cyber readiness? (A) Over-qualified workforce (B) Shortage of skilled professionals (C) Excess funding (D) Too many researchers 23. : Pakistanâs national incident response team is called: (A) NCCERT (B) PakCERT (C) PHCERT (D) PCERT 24. : What does âOSINTâ refer to in cyber intelligence? (A) Openâsource intelligence (B) Operating system intercept (C) Oversight of networks (D) Online server intrusion tool 25. : Which cybersecurity approach is lacking in many Pakistani universities? (A) Academic certificates (B) Securityâfocused curriculum and labs (C) Cafeteria hygiene (D) Module-based teaching 26. : Which challenge do Pakistani critical infrastructure systems face? (A) Lack of power supply (B) Legacy systems and weak cybersecurity (C) High-speed internet (D) Overstaffed IT departments 27. : WhatsApp scams on mobile users exploit: (A) Push notifications (B) Social engineering and malware links (C) Manual dialing (D) SIM card encryption 28. : Pakistanâs digital ID system is managed by: (A) PTA (B) FIA (C) NADRA (D) PakCERT 29. : A cyber challenge with IoT devices in Pakistan is: (A) Too many mobile apps (B) Poor device security and default credentials (C) High literacy on cyber hygiene (D) Excessive encryption of all devices 30. : âWhalingâ in cybercrime refers to targeting: (A) Small fishes (B) Corporate executives (C) Cruise ships (D) Marine biometrics 31. : Pakistanâs judicial awareness of digital evidence is challenged by: (A) Too much hardware (B) Lack of trained forensic experts (C) Frequent court dates (D) Data redundancy 32. : APTs targeting Pakistan often originate from what type of actors? (A) Environmental activists (B) Nationâstates (C) Religious groups (D) Retail stores 33. : The biggest singleâpoint failure in many Pakistani networks is: (A) Backup servers (B) Single login password (C) Pencil backups (D) Oversized data centers 34. : Which practice helps mitigate ransomware risk? (A) Regular offline backups (B) Disable antivirus (C) Keep default passwords (D) Use outdated software 35. : Pakistan hosted which Cyber Security exercise in 2019 emphasizing publicâprivate collaboration? (A) Cyber Storm (B) Winja (C) Exercise Locking the Chain (D) Cyber Flag 36. : What kind of vulnerability does outdated software introduce? (A) Physical corrosion (B) Exploitable security flaws (C) Enhanced features (D) Faster execution 37. : Zeroâday vulnerabilities are: (A) Problems fixed within one day (B) Unknown to vendors and exploitable immediately (C) Software tests done on day zero of release (D) Always harmless 38. : Mobile banking in Pakistan is exposed due to: (A) Encryption overload (B) Weak authentication and fake apps (C) Too many banks (D) Overstaffed branches 39. : Pakistanâs CII (critical information infrastructure) includes: (A) Social media (B) Telecoms, energy and financial networks (C) Home theater systems (D) Personal blogs 40. : Which of the following is a policy-level challenge in Pakistan? (A) Too much cybersecurity staffing (B) Lack of interoperability in rules across provinces (C) Excessive encryption mandates (D) National censorship 41. : To secure SCADA systems in Pakistan, one must: (A) Use default configs (B) Implement network segmentation and monitoring (C) Disable all passwords (D) Give open access 42. : Which emerging threat involves automated scripts scanning for vulnerabilities? (A) Patching (B) Botnets (C) Manual testing (D) Social engineering 43. : Educational institutions in Pakistan struggle with cyber security due to: (A) High cyber budgets (B) Shared passwords and open WiâFi (C) Paper-based exams (D) No digital presence 44. : For government cybersecurity, Pakistan collaborates regionally with: (A) ASEAN (B) SCO (Shanghai Cooperation Organization) (C) NATO (D) Euromed 45. : A major privacy concern in Pakistan is: (A) Overâpublication of public data (B) Biometric data misuse (C) Too much paper use (D) Lack of internet 46. : What role does encryption serve in cybersecurity? (A) Slows down systems (B) Protects data confidentiality (C) Enables spyâware (D) Overrides passwords 47. : Pakistanâs eâgovernment platforms are vulnerable because of: (A) Slow CPUs (B) SQL injection and weak input sanitization (C) Too many features (D) Closedâsource only 48. : What is cyber resilience? (A) Manual firewall resets (B) Ability to recover quickly from attacks (C) Always staying offline (D) Frequent reboots 49. : Which tool helps monitor network traffic in Pakistanâs orgs? (A) Wireshark (B) Idle browser tabs (C) Word processors (D) Antivirus only 50. : A future challenge for Pakistan is securing: (A) Paper mail (B) Quantumâenabled cryptography and AIâdriven attacks (C) Candleâlit offices (D) Manual ledgers