NSCT – Introduction to Cyber Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . What is Cyber Security? (A) Protection of computers and networks from digital attacks (B) Only protecting hardware from damage (C) A type of computer programming language (D) A method of making websitesShow All AnswersShow All Answers 2. . Which of the following is a common cyber threat? (A) Phishing (B) Gardening (C) Painting (D) DrivingShow All Answers 3. . A strong password should contain: (A) Only numbers (B) Only letters (C) Letters, numbers, and special characters (D) Only special charactersShow All Answers 4. . Which of the following is used to protect a network from unauthorized access? (A) Printer (B) Firewall (C) Scanner (D) MonitorShow All Answers 5. . Phishing is: (A) A method of catching fish (B) A type of antivirus (C) A computer game (D) A cyber attack that tricks users into giving personal informationShow All Answers 6. . Which software helps detect and remove computer viruses? (A) Antivirus (B) Browser (C) Calculator (D) Media PlayerShow All Answers 7. . Malware stands for: (A) Malfunctioning Hardware (B) Multiple Software (C) Malicious Software (D) Managed SoftwareShow All Answers 8. . Which of the following is an example of malware? (A) Keyboard (B) Virus (C) Monitor (D) PrinterShow All Answers 9. . A hacker is a person who: (A) Repairs computers (B) Gains unauthorized access to computer systems (C) Studies computer science (D) Only uses the internetShow All Answers 10. . Two-Factor Authentication (2FA) provides: (A) Double internet speed (B) Extra security by using two verification methods (C) Two computers together (D) Two passwords onlyShow All Answers 11. . Which of the following protects data by converting it into a secret code? (A) Decryption (B) Encryption (C) Compression (D) FormattingShow All Answers 12. . Which cyber attack involves sending a large amount of traffic to crash a website? (A) DDoS Attack (B) Phishing (C) Hacking (D) SpammingShow All Answers 13. . What is the purpose of a VPN? (A) Increase computer size (B) Secure internet connection and protect privacy (C) Delete files (D) Create virusesShow All Answers 14. . Spam emails are: (A) Unwanted or junk emails (B) Important official emails (C) School emails (D) Government emailsShow All Answers 15. . Which of the following is used to keep software secure? (A) Ignoring updates (B) Regular updates (C) Deleting programs (D) Turning off the computerShow All Answers 16. . Social engineering is: (A) Building social networks (B) Manipulating people to reveal confidential information (C) Designing websites (D) Writing softwareShow All Answers 17. . Which of the following is a good cyber security practice? (A) Sharing passwords with friends (B) Using strong and unique passwords (C) Clicking unknown links (D) Using weak passwordsShow All Answers 18. . Which device stores and processes data in a computer system? (A) CPU (B) Keyboard (C) Mouse (D) SpeakerShow All Answers 19. . Which of the following helps protect personal information online? (A) Using secure websites (HTTPS) (B) Sharing personal data publicly (C) Ignoring privacy settings (D) Using public computers for bankingShow All Answers 20. . The main goal of cyber security is to ensure: (A) Confidentiality, Integrity, and Availability of information (B) Faster internet (C) Entertainment (D) More websitesShow All Answers