T4Tutorials .PK

NSCT – Malware & Attack Techniques MCQs

1. . Malware is defined as:

(A) Software to speed up the internet


(B) A type of firewall


(C) A computer hardware device


(D) Malicious software designed to harm or exploit systems




2. . Which of the following is NOT a type of malware?

(A) Virus


(B) Worm


(C) Trojan


(D) Firewall




3. . A computer virus:

(A) Attaches itself to files and spreads when executed


(B) Deletes the operating system automatically


(C) Improves system performance


(D) Blocks internet access




4. . A worm:

(A) Is a type of firewall


(B) Only spreads through email attachments


(C) Can spread automatically across networks without user intervention


(D) Encrypts files only




5. . Trojan horse malware:

(A) Increases internet speed


(B) Only slows down computers


(C) Appears legitimate but contains malicious code


(D) Automatically deletes files safely




6. . Ransomware is malware that:

(A) Deletes system files automatically


(B) Encrypts user data and demands payment for decryption


(C) Spreads like a worm


(D) Blocks antivirus programs only




7. . Spyware is malware that:

(A) Deletes old files


(B) Monitors user activity and steals sensitive information


(C) Encrypts data only


(D) Increases CPU speed




8. . Adware is:

(A) An antivirus program


(B) A type of firewall


(C) Software that displays unwanted advertisements


(D) Network security tool




9. . Keyloggers are malware that:

(A) Increase internet speed


(B) Encrypt data automatically


(C) Record keystrokes to steal passwords and sensitive information


(D) Compress files




10. . Rootkits are malware designed to:

(A) Speed up system performance


(B) Encrypt files


(C) Delete system logs


(D) Hide the presence of malicious software and maintain privileged access




11. . Which of the following is a social engineering attack?

(A) Phishing


(B) Trojan


(C) Worm


(D) Virus




12. . Phishing attacks aim to:

(A) Block network traffic


(B) Install antivirus software


(C) Encrypt system files


(D) Trick users into revealing sensitive information like passwords




13. . Denial-of-Service (DoS) attack:

(A) Deletes files automatically


(B) Makes a system or network unavailable to legitimate users


(C) Encrypts only emails


(D) Speeds up internet connections




14. . Distributed Denial-of-Service (DDoS) attack:

(A) Encrypts files


(B) Increases system speed


(C) Deletes malware


(D) Uses multiple systems to flood a target with traffic




15. . Man-in-the-Middle (MITM) attack:

(A) Speeds up network traffic


(B) Deletes user accounts


(C) Encrypts files safely


(D) Intercepts communication between two parties




16. . A zero-day attack exploits:

(A) Network firewalls


(B) Only old operating systems


(C) Unknown vulnerabilities in software before patches are released


(D) Antivirus programs




17. . SQL Injection is an attack where:

(A) Internet traffic is blocked


(B) Emails are deleted automatically


(C) Files are encrypted


(D) Malicious SQL code is inserted into input fields to manipulate databases




18. . Cross-Site Scripting (XSS) attack allows:

(A) Faster downloads


(B) Automatic encryption of files


(C) Deletion of emails


(D) Execution of malicious scripts in a user's browser




19. . Brute force attack involves:

(A) Flooding network traffic


(B) Encrypting system files


(C) Deleting malicious software


(D) Trying all possible password combinations to gain access




20. . The main goal of malware and attack techniques is to:

(A) Compress data


(B) Increase system speed


(C) Backup files


(D) Steal, damage, or disrupt information systems




Exit mobile version