Hybrid Warfare & Cyber Security Threats MCQs With Answer
Hybrid warfare is a combination of:
A) Conventional and irregular warfare
B) Physical and cyber warfare
C) Economic and psychological warfare
D) All of the above
Which of the following is a key component of hybrid warfare?
A) Diplomatic negotiations
B) Economic sanctions
C) Misinformation and propaganda
D) Military parades
Cybersecurity threats primarily target:
A) Physical infrastructure
B) Digital networks and information systems
C) Military bases
D) Transportation systems
Which country is often credited with pioneering modern hybrid warfare tactics?
A) China
B) Russia
C) USA
D) Germany
Which organization is responsible for cyber security in Pakistan?
A) PTA (Pakistan Telecommunication Authority)
B) FIA (Federal Investigation Agency)
C) NACTA (National Counter Terrorism Authority)
D) Both A & B
A Denial of Service (DoS) attack aims to:
A) Steal confidential information
B) Overload a system to make it unavailable
C) Spread misinformation
D) Hack into social media accounts
Which type of warfare includes fake news and propaganda?
A) Cyber warfare
B) Psychological warfare
C) Economic warfare
D) Guerrilla warfare
Which sector is most vulnerable to cyber-attacks?
A) Banking
B) Military
C) Healthcare
D) All of the above
Which of the following is NOT a cybersecurity threat?
A) Phishing
B) Malware
C) Data Encryption
D) Ransomware
The Cyber Crime Wing of FIA in Pakistan was established in:
A) 2005
B) 2010
C) 2016
D) 2018
Which attack involves malicious software demanding a ransom?
A) Spyware
B) Ransomware
C) Trojan Horse
D) Worm
Hybrid warfare mainly exploits:
A) Economic weaknesses
B) Political instability
C) Ethnic divisions
D) All of the above
Which country has been accused of interfering in foreign elections through cyber warfare?
A) Russia
B) China
C) USA
D) North Korea
Which is an example of cyber espionage?
A) Stealing classified military documents
B) Broadcasting propaganda
C) Conducting military drills
D) Economic sanctions
Which law in Pakistan deals with cybercrime?
A) National Cyber Law
B) Prevention of Electronic Crimes Act (PECA) 2016
C) Digital Protection Act 2020
D) Cyber Security Regulation Act
Which cyber threat is designed to look like a legitimate program but is harmful?
A) Ransomware
B) Trojan Horse
C) Worm
D) Spyware
What is social engineering in cyber security?
A) Manipulating people to share sensitive information
B) Using AI for hacking
C) Encrypting data
D) Improving cyber defense strategies
Which organization coordinates cyber security efforts in Pakistan?
A) PTA
B) ISPR
C) NR3C (National Response Center for Cyber Crimes)
D) NAB
What is the primary goal of hybrid warfare?
A) Military occupation
B) Economic collapse
C) Destabilization through multiple tactics
D) None of the above
Which of the following cybersecurity practices can prevent hacking?
A) Using weak passwords
B) Clicking on unknown links
C) Enabling two-factor authentication
D) Ignoring security updates
Which of the following is NOT a component of hybrid warfare?
A) Conventional military operations
B) Cyberattacks
C) Political propaganda
D) Agricultural reforms
What is the purpose of deepfake technology in hybrid warfare?
A) Improving internet speed
B) Creating realistic but fake videos to manipulate public opinion
C) Enhancing cybersecurity
D) Strengthening military communications
Which of the following is an economic tactic in hybrid warfare?
A) Economic sanctions
B) Inflation control
C) Trade agreements
D) None of the above
Which cyber-attack spreads without human intervention?
A) Worm
B) Trojan Horse
C) Phishing
D) Spyware
Which of the following is an example of psychological warfare?
A) Military invasion
B) Cyber espionage
C) Spreading fake news to influence public opinion
D) Hacking bank accounts
Which organization plays a key role in global cyber security?
A) NATO
B) World Bank
C) WHO
D) UNESCO
What is spear phishing?
A) A fishing technique
B) A targeted cyber attack using fake emails
C) A new type of military weapon
D) A financial scam
Which country faced one of the most significant cyber-attacks in history with the Stuxnet virus?
A) Pakistan
B) Iran
C) USA
D) China
Which type of attack involves hackers secretly monitoring user activities?
A) Ransomware
B) Phishing
C) Spyware
D) DDoS
What is cyber deterrence?
A) Preventing cybercrime by legal actions
B) Using cyber-attacks as a defense strategy
C) Avoiding cybersecurity measures
D) None of the above