Global Cybersecurity and Hacking Threats MCQs with Answer
What is the primary goal of cybersecurity?
a) To protect personal devices from dust and damage
b) To secure digital systems and data from unauthorized access
c) To prevent legal actions against hackers
d) To increase internet speed
Which of the following is an example of a phishing attack?
a) A hacker installing malware remotely
b) An attacker using fake emails to steal credentials
c) A virus spreading through a USB drive
d) A brute-force attack on a password
What does a firewall do?
a) Blocks all internet connections
b) Filters and monitors incoming and outgoing network traffic
c) Increases internet speed
d) Prevents software from updating
What type of malware locks users out of their system until a ransom is paid?
a) Trojan horse
b) Worm
c) Ransomware
d) Spyware
Which of the following is a strong password?
a) 123456
b) password123
c) P@ssw0rd!2024
d) userlogin
What is the purpose of two-factor authentication (2FA)?
a) To make logging in more complicated
b) To add an extra layer of security by requiring a second form of verification
c) To replace the need for passwords
d) To reduce internet speed
What is social engineering in cybersecurity?
a) A type of firewall
b) The use of psychological manipulation to trick users into revealing information
c) A method of encryption
d) A way to increase internet security
What is a DDoS attack?
a) A virus that spreads through emails
b) A cyberattack that overwhelms a system with excessive traffic
c) A method of password cracking
d) A hacking tool used for stealing personal data
What does the term “zero-day exploit” refer to?
a) A security vulnerability that is exploited before it is discovered and patched
b) A type of firewall
c) A type of anti-virus software
d) A hacker’s first attack
Which of the following is an example of a brute-force attack?
a) Sending a fake email with malicious links
b) Trying multiple password combinations until access is gained
c) Exploiting software vulnerabilities
d) Encrypting files and demanding ransom
What does VPN stand for?
a) Virtual Private Network
b) Virus Protection Network
c) Virtual Public Node
d) Verified Personal Network
Which organization is responsible for global cybersecurity regulations?
a) World Health Organization (WHO)
b) International Telecommunication Union (ITU)
c) Federal Reserve Bank
d) United Nations Educational, Scientific and Cultural Organization (UNESCO)
Which of the following is NOT a type of malware?
a) Virus
b) Ransomware
c) Firewall
d) Spyware
What is the role of encryption in cybersecurity?
a) To slow down hackers
b) To protect data by converting it into a secure format
c) To delete viruses from a system
d) To block pop-ups on a website
What is the main goal of ethical hacking?
a) To steal data legally
b) To improve cybersecurity by identifying vulnerabilities
c) To hack into government systems
d) To spread malware
Which of the following best describes spyware?
a) A tool used to clean a computer
b) A software that secretly gathers user information
c) A type of antivirus program
d) A method of encrypting files
What does HTTPS stand for?
a) Hyper Text Transfer Protocol Secure
b) Hyperlink Transfer Text Secure
c) High-Tech Transfer Security
d) Host Transfer Technology Secure
Which programming language is commonly used for writing malware?
a) Java
b) Python
c) C++
d) All of the above
What is the term for unauthorized access to computer systems?
a) Hacking
b) Surfing
c) Phishing
d) Tracking
What is the purpose of an Intrusion Detection System (IDS)?
a) To detect and alert about suspicious network activity
b) To block all incoming traffic
c) To increase internet speed
d) To prevent website tracking
Which of the following is a common cybersecurity framework?
a) GDPR
b) ISO 27001
c) DMCA
d) SEO
What is a Trojan horse in cybersecurity?
a) A type of firewall
b) A malware disguised as a legitimate program
c) A method of hacking passwords
d) A type of cybersecurity policy