NSCT – Malware & Attack Techniques MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Malware is defined as: (A) Software to speed up the internet (B) A type of firewall (C) A computer hardware device (D) Malicious software designed to harm or exploit systemsShow All Answers 2. . Which of the following is NOT a type of malware? (A) Virus (B) Worm (C) Trojan (D) Firewall 3. . A computer virus: (A) Attaches itself to files and spreads when executed (B) Deletes the operating system automatically (C) Improves system performance (D) Blocks internet access 4. . A worm: (A) Is a type of firewall (B) Only spreads through email attachments (C) Can spread automatically across networks without user intervention (D) Encrypts files only 5. . Trojan horse malware: (A) Increases internet speed (B) Only slows down computers (C) Appears legitimate but contains malicious code (D) Automatically deletes files safely 6. . Ransomware is malware that: (A) Deletes system files automatically (B) Encrypts user data and demands payment for decryption (C) Spreads like a worm (D) Blocks antivirus programs only 7. . Spyware is malware that: (A) Deletes old files (B) Monitors user activity and steals sensitive information (C) Encrypts data only (D) Increases CPU speed 8. . Adware is: (A) An antivirus program (B) A type of firewall (C) Software that displays unwanted advertisements (D) Network security tool 9. . Keyloggers are malware that: (A) Increase internet speed (B) Encrypt data automatically (C) Record keystrokes to steal passwords and sensitive information (D) Compress files 10. . Rootkits are malware designed to: (A) Speed up system performance (B) Encrypt files (C) Delete system logs (D) Hide the presence of malicious software and maintain privileged access 11. . Which of the following is a social engineering attack? (A) Phishing (B) Trojan (C) Worm (D) Virus 12. . Phishing attacks aim to: (A) Block network traffic (B) Install antivirus software (C) Encrypt system files (D) Trick users into revealing sensitive information like passwords 13. . Denial-of-Service (DoS) attack: (A) Deletes files automatically (B) Makes a system or network unavailable to legitimate users (C) Encrypts only emails (D) Speeds up internet connections 14. . Distributed Denial-of-Service (DDoS) attack: (A) Encrypts files (B) Increases system speed (C) Deletes malware (D) Uses multiple systems to flood a target with traffic 15. . Man-in-the-Middle (MITM) attack: (A) Speeds up network traffic (B) Deletes user accounts (C) Encrypts files safely (D) Intercepts communication between two parties 16. . A zero-day attack exploits: (A) Network firewalls (B) Only old operating systems (C) Unknown vulnerabilities in software before patches are released (D) Antivirus programs 17. . SQL Injection is an attack where: (A) Internet traffic is blocked (B) Emails are deleted automatically (C) Files are encrypted (D) Malicious SQL code is inserted into input fields to manipulate databases 18. . Cross-Site Scripting (XSS) attack allows: (A) Faster downloads (B) Automatic encryption of files (C) Deletion of emails (D) Execution of malicious scripts in a user's browser 19. . Brute force attack involves: (A) Flooding network traffic (B) Encrypting system files (C) Deleting malicious software (D) Trying all possible password combinations to gain access 20. . The main goal of malware and attack techniques is to: (A) Compress data (B) Increase system speed (C) Backup files (D) Steal, damage, or disrupt information systems