Current Affairs

Global Cybersecurity and Hacking Threats MCQs with Answer

What is the primary goal of cybersecurity?
a) To protect personal devices from dust and damage
b) To secure digital systems and data from unauthorized access
c) To prevent legal actions against hackers
d) To increase internet speed

Answer
b) To secure digital systems and data from unauthorized access

Which of the following is an example of a phishing attack?
a) A hacker installing malware remotely
b) An attacker using fake emails to steal credentials
c) A virus spreading through a USB drive
d) A brute-force attack on a password

Answer
b) An attacker using fake emails to steal credentials

What does a firewall do?
a) Blocks all internet connections
b) Filters and monitors incoming and outgoing network traffic
c) Increases internet speed
d) Prevents software from updating

Answer
b) Filters and monitors incoming and outgoing network traffic

What type of malware locks users out of their system until a ransom is paid?
a) Trojan horse
b) Worm
c) Ransomware
d) Spyware

Answer
c) Ransomware

Which of the following is a strong password?
a) 123456
b) password123
c) P@ssw0rd!2024
d) userlogin

Answer
c) P@ssw0rd!2024

What is the purpose of two-factor authentication (2FA)?
a) To make logging in more complicated
b) To add an extra layer of security by requiring a second form of verification
c) To replace the need for passwords
d) To reduce internet speed

Answer
b) To add an extra layer of security by requiring a second form of verification

What is social engineering in cybersecurity?
a) A type of firewall
b) The use of psychological manipulation to trick users into revealing information
c) A method of encryption
d) A way to increase internet security

Answer
b) The use of psychological manipulation to trick users into revealing information

What is a DDoS attack?
a) A virus that spreads through emails
b) A cyberattack that overwhelms a system with excessive traffic
c) A method of password cracking
d) A hacking tool used for stealing personal data

Answer
b) A cyberattack that overwhelms a system with excessive traffic

What does the term “zero-day exploit” refer to?
a) A security vulnerability that is exploited before it is discovered and patched
b) A type of firewall
c) A type of anti-virus software
d) A hacker’s first attack

Answer
a) A security vulnerability that is exploited before it is discovered and patched

Which of the following is an example of a brute-force attack?
a) Sending a fake email with malicious links
b) Trying multiple password combinations until access is gained
c) Exploiting software vulnerabilities
d) Encrypting files and demanding ransom

Answer
b) Trying multiple password combinations until access is gained

What does VPN stand for?
a) Virtual Private Network
b) Virus Protection Network
c) Virtual Public Node
d) Verified Personal Network

Answer
a) Virtual Private Network

Which organization is responsible for global cybersecurity regulations?
a) World Health Organization (WHO)
b) International Telecommunication Union (ITU)
c) Federal Reserve Bank
d) United Nations Educational, Scientific and Cultural Organization (UNESCO)

Answer
b) International Telecommunication Union (ITU)

Which of the following is NOT a type of malware?
a) Virus
b) Ransomware
c) Firewall
d) Spyware

Answer
c) Firewall

What is the role of encryption in cybersecurity?
a) To slow down hackers
b) To protect data by converting it into a secure format
c) To delete viruses from a system
d) To block pop-ups on a website

Answer
b) To protect data by converting it into a secure format

What is the main goal of ethical hacking?
a) To steal data legally
b) To improve cybersecurity by identifying vulnerabilities
c) To hack into government systems
d) To spread malware

Answer
b) To improve cybersecurity by identifying vulnerabilities

Which of the following best describes spyware?
a) A tool used to clean a computer
b) A software that secretly gathers user information
c) A type of antivirus program
d) A method of encrypting files

Answer
b) A software that secretly gathers user information

What does HTTPS stand for?
a) Hyper Text Transfer Protocol Secure
b) Hyperlink Transfer Text Secure
c) High-Tech Transfer Security
d) Host Transfer Technology Secure

Answer
a) Hyper Text Transfer Protocol Secure

Which programming language is commonly used for writing malware?
a) Java
b) Python
c) C++
d) All of the above

Answer
d) All of the above

What is the term for unauthorized access to computer systems?
a) Hacking
b) Surfing
c) Phishing
d) Tracking

Answer
a) Hacking

What is the purpose of an Intrusion Detection System (IDS)?
a) To detect and alert about suspicious network activity
b) To block all incoming traffic
c) To increase internet speed
d) To prevent website tracking

Answer
a) To detect and alert about suspicious network activity

Which of the following is a common cybersecurity framework?
a) GDPR
b) ISO 27001
c) DMCA
d) SEO

Answer
b) ISO 27001

What is a Trojan horse in cybersecurity?
a) A type of firewall
b) A malware disguised as a legitimate program
c) A method of hacking passwords
d) A type of cybersecurity policy

Answer
b) A malware disguised as a legitimate program

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button