Cybersecurity & Governance MCQs with Answer
What is the primary objective of cybersecurity in governance?
a) Enhancing social media engagement
b) Protecting digital assets and sensitive data
c) Increasing internet speed
d) Reducing hardware costs
Which international organization sets cybersecurity standards?
a) WHO
b) ISO
c) FIFA
d) WTO
Which type of cyber attack involves tricking users into providing confidential information?
a) Ransomware
b) Phishing
c) DDoS attack
d) Malware
What is a firewall used for in cybersecurity?
a) Blocking unauthorized access to networks
b) Speeding up internet connections
c) Enhancing computer performance
d) Cooling down servers
Which law in Pakistan governs cybercrimes?
a) Prevention of Electronic Crimes Act (PECA) 2016
b) National Security Act
c) Cyber Protection Act 2012
d) Digital Safety Act 2020
Which term refers to unauthorized access to data?
a) Data mining
b) Data breach
c) Data backup
d) Data processing
What does GDPR stand for?
a) Global Data Protection Regulation
b) General Data Protection Regulation
c) Government Digital Privacy Rules
d) General Data Prevention Regulation
What is the primary purpose of encryption in cybersecurity?
a) Increasing storage space
b) Hiding data from unauthorized access
c) Making files easier to read
d) Improving internet speed
Which of the following is an example of multi-factor authentication (MFA)?
a) Using a single password
b) Entering a password and a one-time code
c) Logging in with a username only
d) Using a weak password
Which of the following is a key component of cybersecurity governance?
a) Ignoring security threats
b) Implementing strong security policies
c) Encouraging employees to share passwords
d) Disabling firewalls
Which cyberattack disrupts services by overwhelming a network with traffic?
a) Phishing
b) Ransomware
c) Denial-of-Service (DoS) attack
d) Spyware
Which entity is responsible for internet governance globally?
a) ICANN
b) NASA
c) FBI
d) WHO
What does a VPN do in terms of cybersecurity?
a) Increases internet speed
b) Encrypts internet traffic for security
c) Lowers mobile data consumption
d) Reduces network security
Which of the following is NOT a cybersecurity best practice?
a) Using strong passwords
b) Regularly updating software
c) Clicking on unknown links in emails
d) Enabling two-factor authentication
What is the main goal of ethical hacking?
a) Stealing sensitive data
b) Testing security vulnerabilities
c) Crashing company networks
d) Spreading malware
Which of these is an example of social engineering in cyberattacks?
a) Strong password usage
b) Emailing a fake urgent request for login credentials
c) Using antivirus software
d) Encrypting files
What does the term “zero-day vulnerability” mean?
a) A system bug that was found but not fixed yet
b) A cyberattack that lasts for one day
c) A password reset process
d) A firewall upgrade
Which cybersecurity framework is widely used for managing risk?
a) NIST
b) WHO
c) WTO
d) NBA
What does a ransomware attack do?
a) Encrypts files and demands a ransom
b) Increases internet speed
c) Prevents email access
d) Deletes all files permanently
Which sector is a prime target for cyberattacks?
a) Healthcare
b) Agriculture
c) Sports
d) Entertainment
Which law requires companies to disclose data breaches in the U.S.?
a) Cybersecurity Information Sharing Act (CISA)
b) Data Hiding Act
c) Secure Password Policy
d) Data Prevention Law
Which of the following is an example of a strong password?
a) 123456
b) admin
c) P@ssw0rd!2024
d) userpassword
Which malware disguises itself as a legitimate program?
a) Trojan horse
b) Worm
c) Ransomware
d) Spyware
What is the first step in responding to a cyber incident?
a) Ignoring the issue
b) Containing the threat
c) Shutting down the entire network
d) Informing the media immediately
Which of the following is a cybersecurity risk for cloud storage?
a) Data breaches
b) Increased security
c) Faster file access
d) Reduced cyberattacks
What does cybersecurity governance aim to achieve?
a) Enhancing digital security policies
b) Increasing entertainment options
c) Reducing internet costs
d) Blocking social media usage
Which of the following is NOT a cyber threat?
a) Spyware
b) Malware
c) Cloud computing
d) Phishing
What is the role of an Intrusion Detection System (IDS)?
a) Detects and alerts about cyber intrusions
b) Increases WiFi speed
c) Prevents unauthorized software installation
d) Blocks all outgoing internet traffic
Which attack involves hackers taking control of IoT devices?
a) Botnet attack
b) Phishing attack
c) Keylogging
d) SQL injection