1. : Which of the following is a type of cyber attack where attackers send fake emails to trick users into giving sensitive information?
(A) Malware
(B) Phishing
(C) DDoS
(D) SQL Injection
2. : A virus, worm, and trojan horse are examples of:
(A) Spyware
(B) Social Engineering
(C) Malware
(D) Ransomware
3. : In a Denial of Service (DoS) attack, the attacker’s goal is to:
(A) Steal money from banks
(B) Encrypt files for ransom
(C) Overload a system to make it unavailable
(D) Delete all data permanently
4. : Which attack involves locking or encrypting a victim’s files and demanding payment?
(A) Keylogging
(B) Ransomware
(C) Spyware
(D) Rootkit
5. : Which of the following attacks targets databases by injecting malicious queries?
(A) Phishing
(B) Brute Force
(C) SQL Injection
(D) DoS Attack
6. : A Distributed Denial of Service (DDoS) attack is different from DoS because:
(A) It uses multiple computers or bots to launch the attack
(B) It targets only small websites
(C) It always steals passwords
(D) It works without the internet
7. : Which attack records every keystroke made by a user to steal information?
(A) Keylogging
(B) Phishing
(C) Spoofing
(D) Ransomware
8. : Spoofing attacks involve:
(A) Faking an identity such as IP address, email, or website to trick users
(B) Encrypting all user files
(C) Deleting operating systems
(D) Flooding a system with traffic
9. : Which cyber attack secretly monitors user activity and collects data without consent?
(A) Spyware
(B) Worm
(C) SQL Injection
(D) Rootkit
10. : A brute force attack is used to:
(A) Guess passwords by trying many possible combinations
(B) Flood a website with traffic
(C) Inject malicious code into apps
(D) Spy on user activity