T4Tutorials .PK

NSCT – Introduction to Cyber Security MCQs

1. . What is Cyber Security?

(A) Protection of computers and networks from digital attacks


(B) Only protecting hardware from damage


(C) A type of computer programming language


(D) A method of making websites




2. . Which of the following is a common cyber threat?

(A) Phishing


(B) Gardening


(C) Painting


(D) Driving




3. . A strong password should contain:

(A) Only numbers


(B) Only letters


(C) Letters, numbers, and special characters


(D) Only special characters




4. . Which of the following is used to protect a network from unauthorized access?

(A) Printer


(B) Firewall


(C) Scanner


(D) Monitor




5. . Phishing is:

(A) A method of catching fish


(B) A type of antivirus


(C) A computer game


(D) A cyber attack that tricks users into giving personal information




6. . Which software helps detect and remove computer viruses?

(A) Antivirus


(B) Browser


(C) Calculator


(D) Media Player




7. . Malware stands for:

(A) Malfunctioning Hardware


(B) Multiple Software


(C) Malicious Software


(D) Managed Software




8. . Which of the following is an example of malware?

(A) Keyboard


(B) Virus


(C) Monitor


(D) Printer




9. . A hacker is a person who:

(A) Repairs computers


(B) Gains unauthorized access to computer systems


(C) Studies computer science


(D) Only uses the internet




10. . Two-Factor Authentication (2FA) provides:

(A) Double internet speed


(B) Extra security by using two verification methods


(C) Two computers together


(D) Two passwords only




11. . Which of the following protects data by converting it into a secret code?

(A) Decryption


(B) Encryption


(C) Compression


(D) Formatting




12. . Which cyber attack involves sending a large amount of traffic to crash a website?

(A) DDoS Attack


(B) Phishing


(C) Hacking


(D) Spamming




13. . What is the purpose of a VPN?

(A) Increase computer size


(B) Secure internet connection and protect privacy


(C) Delete files


(D) Create viruses




14. . Spam emails are:

(A) Unwanted or junk emails


(B) Important official emails


(C) School emails


(D) Government emails




15. . Which of the following is used to keep software secure?

(A) Ignoring updates


(B) Regular updates


(C) Deleting programs


(D) Turning off the computer




16. . Social engineering is:

(A) Building social networks


(B) Manipulating people to reveal confidential information


(C) Designing websites


(D) Writing software




17. . Which of the following is a good cyber security practice?

(A) Sharing passwords with friends


(B) Using strong and unique passwords


(C) Clicking unknown links


(D) Using weak passwords




18. . Which device stores and processes data in a computer system?

(A) CPU


(B) Keyboard


(C) Mouse


(D) Speaker




19. . Which of the following helps protect personal information online?

(A) Using secure websites (HTTPS)


(B) Sharing personal data publicly


(C) Ignoring privacy settings


(D) Using public computers for banking




20. . The main goal of cyber security is to ensure:

(A) Confidentiality, Integrity, and Availability of information


(B) Faster internet


(C) Entertainment


(D) More websites




Exit mobile version