1. : Which Pakistani government body is primarily responsible for national cyber security policy?
(A) Pakistan Telecommunication Authority (PTA)
(B) Federal Investigation Agency (FIA)
(C) Pakistan Computer Emergency Response Team (PakCERT)
(D) Ministry of Information Technology & Telecommunication
2. : What is the most common cyber threat faced by Pakistani businesses?
(A) Ransomware
(B) Distributed Denial of Service (DDoS)
(C) Supply‑chain attacks
(D) Advanced Persistent Threats (APTs)
3. : Which sector in Pakistan has seen a rapid rise in cyber attacks due to digital banking?
(A) Agricultural sector
(B) Banking and financial services
(C) Manufacturing industry
(D) Textile industry
4. : What type of cybercrime involves sending deceptive emails to trick users into revealing information?
(A) Social engineering
(B) Phishing
(C) Malware injection
(D) SQL injection
5. : Which organization in Pakistan provides cyber security training and awareness programs?
(A) NADRA
(B) Pakistan Telecommunication Authority
(C) Pakistan Cyber Crime Reporting Center (PCCRC)
(D) Pakistan Institute of Cyber Security (PICS)
6. : What is a major challenge for rural Pakistan in cyber security?
(A) Lack of mobile phones
(B) Poor internet infrastructure
(C) Over-regulation
(D) High literacy rates
7. : PKR is often targeted by cybercriminals because it’s the national currency code of Pakistan, but what kind of threat refers to stealing cryptocurrency wallets?
(A) Cryptojacking
(B) Ransomware
(C) ATM Skimming
(D) Phishing
8. : Which law governs cyber crimes in Pakistan?
(A) Prevention of Electronic Crimes Act (PECA)
(B) Pakistan Penal Code (PPC)
(C) Cyber Security Act
(D) Digital Evidence Act
9. : What kind of attack floods a server with traffic to disrupt services?
(A) Trojan
(B) DDoS
(C) Keylogger
(D) Spyware
10. : What is an insider threat?
(A) External hackers stealing data
(B) Malicious or negligent staff causing security breaches
(C) Government surveillance
(D) Distributed denial‑of‑service attack
11. : Why are small and medium enterprises (SMEs) in Pakistan vulnerable to cyber threats?
(A) Over-budget cybersecurity teams
(B) Limited cybersecurity investment
(C) Excessive regulation
(D) High infrastructure
12. : Which challenge specifically affects Pakistan’s e-commerce platforms?
(A) Lack of customers
(B) Payment gateway vulnerabilities
(C) Lack of mobile access
(D) Poor localization
13. : What type of malware encrypts user data until a ransom is paid?
(A) Ransomware
(B) Adware
(C) Spyware
(D) Worm
14. : The “man-in-the-middle” attack is an example of a threat to:
(A) Physical security
(B) Network communication
(C) Software licensing
(D) Supply chain
15. : A key vulnerability in Pakistan’s smart energy grids is:
(A) Mechanical breakdown
(B) Lack of cyber hygiene and network protection
(C) Too much manual operation
(D) Overstaffing
16. : Which year did Pakistan enact PECA?
(A) 2007
(B) 2015
(C) 2002
(D) 2020
17. : What does two‑factor authentication (2FA) help prevent?
(A) Traffic interception
(B) Unauthorized access
(C) Spyware installation
(D) Worm propagation
18. : Which of the following is a common cyber threat to Pakistan’s national security institutions?
(A) Identity theft
(B) APT infiltration
(C) DDoS on local blogs
(D) Adware
19. : What is meant by “cyber hygiene”?
(A) Cleaning physical servers
(B) Keeping software, passwords, and practices updated
(C) Wiping servers weekly
(D) Using antivirus only
20. : Pakistan’s telecom industry was targeted by what type of threat in recent years?
(A) ATM skimming
(B) Signaling system 7 (SS7) vulnerabilities
(C) Physical break-ins
(D) Air‑gapped networks being tapped
21. : What is the core threat to Pakistan’s healthcare data systems?
(A) Phishing campaigns on staff
(B) Earthquakes
(C) Water shortage
(D) Electrical surges
22. : Which challenge hampers Pakistan’s national cyber readiness?
(A) Over-qualified workforce
(B) Shortage of skilled professionals
(C) Excess funding
(D) Too many researchers
23. : Pakistan’s national incident response team is called:
(A) NCCERT
(B) PakCERT
(C) PHCERT
(D) PCERT
24. : What does “OSINT” refer to in cyber intelligence?
(A) Open‑source intelligence
(B) Operating system intercept
(C) Oversight of networks
(D) Online server intrusion tool
25. : Which cybersecurity approach is lacking in many Pakistani universities?
(A) Academic certificates
(B) Security‑focused curriculum and labs
(C) Cafeteria hygiene
(D) Module-based teaching
26. : Which challenge do Pakistani critical infrastructure systems face?
(A) Lack of power supply
(B) Legacy systems and weak cybersecurity
(C) High-speed internet
(D) Overstaffed IT departments
27. : WhatsApp scams on mobile users exploit:
(A) Push notifications
(B) Social engineering and malware links
(C) Manual dialing
(D) SIM card encryption
28. : Pakistan’s digital ID system is managed by:
(A) PTA
(B) FIA
(C) NADRA
(D) PakCERT
29. : A cyber challenge with IoT devices in Pakistan is:
(A) Too many mobile apps
(B) Poor device security and default credentials
(C) High literacy on cyber hygiene
(D) Excessive encryption of all devices
30. : “Whaling” in cybercrime refers to targeting:
(A) Small fishes
(B) Corporate executives
(C) Cruise ships
(D) Marine biometrics
31. : Pakistan’s judicial awareness of digital evidence is challenged by:
(A) Too much hardware
(B) Lack of trained forensic experts
(C) Frequent court dates
(D) Data redundancy
32. : APTs targeting Pakistan often originate from what type of actors?
(A) Environmental activists
(B) Nation‑states
(C) Religious groups
(D) Retail stores
33. : The biggest single‑point failure in many Pakistani networks is:
(A) Backup servers
(B) Single login password
(C) Pencil backups
(D) Oversized data centers
34. : Which practice helps mitigate ransomware risk?
(A) Regular offline backups
(B) Disable antivirus
(C) Keep default passwords
(D) Use outdated software
35. : Pakistan hosted which Cyber Security exercise in 2019 emphasizing public–private collaboration?
(A) Cyber Storm
(B) Winja
(C) Exercise Locking the Chain
(D) Cyber Flag
36. : What kind of vulnerability does outdated software introduce?
(A) Physical corrosion
(B) Exploitable security flaws
(C) Enhanced features
(D) Faster execution
37. : Zero‑day vulnerabilities are:
(A) Problems fixed within one day
(B) Unknown to vendors and exploitable immediately
(C) Software tests done on day zero of release
(D) Always harmless
38. : Mobile banking in Pakistan is exposed due to:
(A) Encryption overload
(B) Weak authentication and fake apps
(C) Too many banks
(D) Overstaffed branches
39. : Pakistan’s CII (critical information infrastructure) includes:
(A) Social media
(B) Telecoms, energy and financial networks
(C) Home theater systems
(D) Personal blogs
40. : Which of the following is a policy-level challenge in Pakistan?
(A) Too much cybersecurity staffing
(B) Lack of interoperability in rules across provinces
(C) Excessive encryption mandates
(D) National censorship
41. : To secure SCADA systems in Pakistan, one must:
(A) Use default configs
(B) Implement network segmentation and monitoring
(C) Disable all passwords
(D) Give open access
42. : Which emerging threat involves automated scripts scanning for vulnerabilities?
(A) Patching
(B) Botnets
(C) Manual testing
(D) Social engineering
43. : Educational institutions in Pakistan struggle with cyber security due to:
(A) High cyber budgets
(B) Shared passwords and open Wi‑Fi
(C) Paper-based exams
(D) No digital presence
44. : For government cybersecurity, Pakistan collaborates regionally with:
(A) ASEAN
(B) SCO (Shanghai Cooperation Organization)
(C) NATO
(D) Euromed
45. : A major privacy concern in Pakistan is:
(A) Over‑publication of public data
(B) Biometric data misuse
(C) Too much paper use
(D) Lack of internet
46. : What role does encryption serve in cybersecurity?
(A) Slows down systems
(B) Protects data confidentiality
(C) Enables spy‑ware
(D) Overrides passwords
47. : Pakistan’s e‑government platforms are vulnerable because of:
(A) Slow CPUs
(B) SQL injection and weak input sanitization
(C) Too many features
(D) Closed‑source only
48. : What is cyber resilience?
(A) Manual firewall resets
(B) Ability to recover quickly from attacks
(C) Always staying offline
(D) Frequent reboots
49. : Which tool helps monitor network traffic in Pakistan’s orgs?
(A) Wireshark
(B) Idle browser tabs
(C) Word processors
(D) Antivirus only
50. : A future challenge for Pakistan is securing:
(A) Paper mail
(B) Quantum‑enabled cryptography and AI‑driven attacks
(C) Candle‑lit offices
(D) Manual ledgers