Governance & Public Policies

Cybersecurity & Governance MCQs with Answer

What is the primary objective of cybersecurity in governance?
a) Enhancing social media engagement
b) Protecting digital assets and sensitive data
c) Increasing internet speed
d) Reducing hardware costs

Answer
b) Protecting digital assets and sensitive data

Which international organization sets cybersecurity standards?
a) WHO
b) ISO
c) FIFA
d) WTO

Answer
b) ISO

Which type of cyber attack involves tricking users into providing confidential information?
a) Ransomware
b) Phishing
c) DDoS attack
d) Malware

Answer
b) Phishing

What is a firewall used for in cybersecurity?
a) Blocking unauthorized access to networks
b) Speeding up internet connections
c) Enhancing computer performance
d) Cooling down servers

Answer
a) Blocking unauthorized access to networks

Which law in Pakistan governs cybercrimes?
a) Prevention of Electronic Crimes Act (PECA) 2016
b) National Security Act
c) Cyber Protection Act 2012
d) Digital Safety Act 2020

Answer
a) Prevention of Electronic Crimes Act (PECA) 2016

Which term refers to unauthorized access to data?
a) Data mining
b) Data breach
c) Data backup
d) Data processing

Answer
b) Data breach

What does GDPR stand for?
a) Global Data Protection Regulation
b) General Data Protection Regulation
c) Government Digital Privacy Rules
d) General Data Prevention Regulation

Answer
b) General Data Protection Regulation

What is the primary purpose of encryption in cybersecurity?
a) Increasing storage space
b) Hiding data from unauthorized access
c) Making files easier to read
d) Improving internet speed

Answer
b) Hiding data from unauthorized access

Which of the following is an example of multi-factor authentication (MFA)?
a) Using a single password
b) Entering a password and a one-time code
c) Logging in with a username only
d) Using a weak password

Answer
b) Entering a password and a one-time code

Which of the following is a key component of cybersecurity governance?
a) Ignoring security threats
b) Implementing strong security policies
c) Encouraging employees to share passwords
d) Disabling firewalls

Answer
b) Implementing strong security policies

Which cyberattack disrupts services by overwhelming a network with traffic?
a) Phishing
b) Ransomware
c) Denial-of-Service (DoS) attack
d) Spyware

Answer
c) Denial-of-Service (DoS) attack

Which entity is responsible for internet governance globally?
a) ICANN
b) NASA
c) FBI
d) WHO

Answer
a) ICANN

What does a VPN do in terms of cybersecurity?
a) Increases internet speed
b) Encrypts internet traffic for security
c) Lowers mobile data consumption
d) Reduces network security

Answer
b) Encrypts internet traffic for security

Which of the following is NOT a cybersecurity best practice?
a) Using strong passwords
b) Regularly updating software
c) Clicking on unknown links in emails
d) Enabling two-factor authentication

Answer
c) Clicking on unknown links in emails

What is the main goal of ethical hacking?
a) Stealing sensitive data
b) Testing security vulnerabilities
c) Crashing company networks
d) Spreading malware

Answer
b) Testing security vulnerabilities

Which of these is an example of social engineering in cyberattacks?
a) Strong password usage
b) Emailing a fake urgent request for login credentials
c) Using antivirus software
d) Encrypting files

Answer
b) Emailing a fake urgent request for login credentials

What does the term “zero-day vulnerability” mean?
a) A system bug that was found but not fixed yet
b) A cyberattack that lasts for one day
c) A password reset process
d) A firewall upgrade

Answer
a) A system bug that was found but not fixed yet

Which cybersecurity framework is widely used for managing risk?
a) NIST
b) WHO
c) WTO
d) NBA

Answer
a) NIST

What does a ransomware attack do?
a) Encrypts files and demands a ransom
b) Increases internet speed
c) Prevents email access
d) Deletes all files permanently

Answer
a) Encrypts files and demands a ransom

Which sector is a prime target for cyberattacks?
a) Healthcare
b) Agriculture
c) Sports
d) Entertainment

Answer
a) Healthcare

Which law requires companies to disclose data breaches in the U.S.?
a) Cybersecurity Information Sharing Act (CISA)
b) Data Hiding Act
c) Secure Password Policy
d) Data Prevention Law

Answer
a) Cybersecurity Information Sharing Act (CISA)

Which of the following is an example of a strong password?
a) 123456
b) admin
c) P@ssw0rd!2024
d) userpassword

Answer
c) P@ssw0rd!2024

Which malware disguises itself as a legitimate program?
a) Trojan horse
b) Worm
c) Ransomware
d) Spyware

Answer
a) Trojan horse

What is the first step in responding to a cyber incident?
a) Ignoring the issue
b) Containing the threat
c) Shutting down the entire network
d) Informing the media immediately

Answer
b) Containing the threat

Which of the following is a cybersecurity risk for cloud storage?
a) Data breaches
b) Increased security
c) Faster file access
d) Reduced cyberattacks

Answer
a) Data breaches

What does cybersecurity governance aim to achieve?
a) Enhancing digital security policies
b) Increasing entertainment options
c) Reducing internet costs
d) Blocking social media usage

Answer
a) Enhancing digital security policies

Which of the following is NOT a cyber threat?
a) Spyware
b) Malware
c) Cloud computing
d) Phishing

Answer
c) Cloud computing

What is the role of an Intrusion Detection System (IDS)?
a) Detects and alerts about cyber intrusions
b) Increases WiFi speed
c) Prevents unauthorized software installation
d) Blocks all outgoing internet traffic

Answer
a) Detects and alerts about cyber intrusions

Which attack involves hackers taking control of IoT devices?
a) Botnet attack
b) Phishing attack
c) Keylogging
d) SQL injection

Answer
a) Botnet attack

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button