1. . What is Cyber Security?
(A) Protection of computers and networks from digital attacks
(B) Only protecting hardware from damage
(C) A type of computer programming language
(D) A method of making websites
2. . Which of the following is a common cyber threat?
(A) Phishing
(B) Gardening
(C) Painting
(D) Driving
3. . A strong password should contain:
(A) Only numbers
(B) Only letters
(C) Letters, numbers, and special characters
(D) Only special characters
4. . Which of the following is used to protect a network from unauthorized access?
(A) Printer
(B) Firewall
(C) Scanner
(D) Monitor
5. . Phishing is:
(A) A method of catching fish
(B) A type of antivirus
(C) A computer game
(D) A cyber attack that tricks users into giving personal information
6. . Which software helps detect and remove computer viruses?
(A) Antivirus
(B) Browser
(C) Calculator
(D) Media Player
7. . Malware stands for:
(A) Malfunctioning Hardware
(B) Multiple Software
(C) Malicious Software
(D) Managed Software
8. . Which of the following is an example of malware?
(A) Keyboard
(B) Virus
(C) Monitor
(D) Printer
9. . A hacker is a person who:
(A) Repairs computers
(B) Gains unauthorized access to computer systems
(C) Studies computer science
(D) Only uses the internet
10. . Two-Factor Authentication (2FA) provides:
(A) Double internet speed
(B) Extra security by using two verification methods
(C) Two computers together
(D) Two passwords only
11. . Which of the following protects data by converting it into a secret code?
(A) Decryption
(B) Encryption
(C) Compression
(D) Formatting
12. . Which cyber attack involves sending a large amount of traffic to crash a website?
(A) DDoS Attack
(B) Phishing
(C) Hacking
(D) Spamming
13. . What is the purpose of a VPN?
(A) Increase computer size
(B) Secure internet connection and protect privacy
(C) Delete files
(D) Create viruses
14. . Spam emails are:
(A) Unwanted or junk emails
(B) Important official emails
(C) School emails
(D) Government emails
15. . Which of the following is used to keep software secure?
(A) Ignoring updates
(B) Regular updates
(C) Deleting programs
(D) Turning off the computer
16. . Social engineering is:
(A) Building social networks
(B) Manipulating people to reveal confidential information
(C) Designing websites
(D) Writing software
17. . Which of the following is a good cyber security practice?
(A) Sharing passwords with friends
(B) Using strong and unique passwords
(C) Clicking unknown links
(D) Using weak passwords
18. . Which device stores and processes data in a computer system?
(A) CPU
(B) Keyboard
(C) Mouse
(D) Speaker
19. . Which of the following helps protect personal information online?
(A) Using secure websites (HTTPS)
(B) Sharing personal data publicly
(C) Ignoring privacy settings
(D) Using public computers for banking
20. . The main goal of cyber security is to ensure:
(A) Confidentiality, Integrity, and Availability of information
(B) Faster internet
(C) Entertainment
(D) More websites