1. : What is the main goal of hacking?
(A) Designing secure systems
(B) Gaining unauthorized access to computer systems or networks
(C) Writing web content
(D) Speeding up computers
2. : Phishing is a type of cyber attack that usually happens through:
(A) Fake emails or messages
(B) Computer hardware failure
(C) Operating system updates
(D) Social media likes
3. : Malware is a short form of:
(A) Malfunctioning Software
(B) Malicious Software
(C) Manual Hardware
(D) Management Software
4. : Which type of malware restricts user access to data until a ransom is paid?
(A) Spyware
(B) Ransomware
(C) Worm
(D) Trojan
5. : Which of the following is an example of phishing?
(A) Sending fake bank login pages to steal passwords
(B) Encrypting files and demanding money
(C) Infecting a computer with a self-replicating worm
(D) Stealing hardware physically
6. : A Trojan horse in cybersecurity refers to:
(A) A virus that spreads through USB drives
(B) A malicious program disguised as legitimate software
(C) A firewall
(D) A password manager
7. : Which cyber threat self-replicates and spreads without user interaction?
(A) Trojan
(B) Worm
(C) Spyware
(D) Ransomware
8. : Spyware is designed to:
(A) Encrypt files for ransom
(B) Monitor user activity and steal information secretly
(C) Destroy hardware components
(D) Speed up software performance
9. : Which cyber attack locks files and demands payment, often in cryptocurrency?
(A) Phishing
(B) Ransomware
(C) Spyware
(D) Worm
10. : What is the best defense against phishing attacks?
(A) Opening all email links quickly
(B) Using strong antivirus only
(C) Being cautious of suspicious emails and verifying sources
(D) Downloading unknown attachments