1. . Malware is defined as:
(A) Software to speed up the internet
(B) A type of firewall
(C) A computer hardware device
(D) Malicious software designed to harm or exploit systems
2. . Which of the following is NOT a type of malware?
(A) Virus
(B) Worm
(C) Trojan
(D) Firewall
3. . A computer virus:
(A) Attaches itself to files and spreads when executed
(B) Deletes the operating system automatically
(C) Improves system performance
(D) Blocks internet access
4. . A worm:
(A) Is a type of firewall
(B) Only spreads through email attachments
(C) Can spread automatically across networks without user intervention
(D) Encrypts files only
5. . Trojan horse malware:
(A) Increases internet speed
(B) Only slows down computers
(C) Appears legitimate but contains malicious code
(D) Automatically deletes files safely
6. . Ransomware is malware that:
(A) Deletes system files automatically
(B) Encrypts user data and demands payment for decryption
(C) Spreads like a worm
(D) Blocks antivirus programs only
7. . Spyware is malware that:
(A) Deletes old files
(B) Monitors user activity and steals sensitive information
(C) Encrypts data only
(D) Increases CPU speed
8. . Adware is:
(A) An antivirus program
(B) A type of firewall
(C) Software that displays unwanted advertisements
(D) Network security tool
9. . Keyloggers are malware that:
(A) Increase internet speed
(B) Encrypt data automatically
(C) Record keystrokes to steal passwords and sensitive information
(D) Compress files
10. . Rootkits are malware designed to:
(A) Speed up system performance
(B) Encrypt files
(C) Delete system logs
(D) Hide the presence of malicious software and maintain privileged access
11. . Which of the following is a social engineering attack?
(A) Phishing
(B) Trojan
(C) Worm
(D) Virus
12. . Phishing attacks aim to:
(A) Block network traffic
(B) Install antivirus software
(C) Encrypt system files
(D) Trick users into revealing sensitive information like passwords
13. . Denial-of-Service (DoS) attack:
(A) Deletes files automatically
(B) Makes a system or network unavailable to legitimate users
(C) Encrypts only emails
(D) Speeds up internet connections
14. . Distributed Denial-of-Service (DDoS) attack:
(A) Encrypts files
(B) Increases system speed
(C) Deletes malware
(D) Uses multiple systems to flood a target with traffic
15. . Man-in-the-Middle (MITM) attack:
(A) Speeds up network traffic
(B) Deletes user accounts
(C) Encrypts files safely
(D) Intercepts communication between two parties
16. . A zero-day attack exploits:
(A) Network firewalls
(B) Only old operating systems
(C) Unknown vulnerabilities in software before patches are released
(D) Antivirus programs
17. . SQL Injection is an attack where:
(A) Internet traffic is blocked
(B) Emails are deleted automatically
(C) Files are encrypted
(D) Malicious SQL code is inserted into input fields to manipulate databases
18. . Cross-Site Scripting (XSS) attack allows:
(A) Faster downloads
(B) Automatic encryption of files
(C) Deletion of emails
(D) Execution of malicious scripts in a user's browser
19. . Brute force attack involves:
(A) Flooding network traffic
(B) Encrypting system files
(C) Deleting malicious software
(D) Trying all possible password combinations to gain access
20. . The main goal of malware and attack techniques is to:
(A) Compress data
(B) Increase system speed
(C) Backup files
(D) Steal, damage, or disrupt information systems