Pakistan Affairs

Hybrid Warfare & Cyber Security Threats MCQs With Answer

Hybrid warfare is a combination of:
A) Conventional and irregular warfare
B) Physical and cyber warfare
C) Economic and psychological warfare
D) All of the above

Answer
D) All of the above

Which of the following is a key component of hybrid warfare?
A) Diplomatic negotiations
B) Economic sanctions
C) Misinformation and propaganda
D) Military parades

Answer
C) Misinformation and propaganda

Cybersecurity threats primarily target:
A) Physical infrastructure
B) Digital networks and information systems
C) Military bases
D) Transportation systems

Answer
B) Digital networks and information systems

Which country is often credited with pioneering modern hybrid warfare tactics?
A) China
B) Russia
C) USA
D) Germany

Answer
B) Russia

Which organization is responsible for cyber security in Pakistan?
A) PTA (Pakistan Telecommunication Authority)
B) FIA (Federal Investigation Agency)
C) NACTA (National Counter Terrorism Authority)
D) Both A & B

Answer
D) Both A & B

A Denial of Service (DoS) attack aims to:
A) Steal confidential information
B) Overload a system to make it unavailable
C) Spread misinformation
D) Hack into social media accounts

Answer
B) Overload a system to make it unavailable

Which type of warfare includes fake news and propaganda?
A) Cyber warfare
B) Psychological warfare
C) Economic warfare
D) Guerrilla warfare

Answer
B) Psychological warfare

Which sector is most vulnerable to cyber-attacks?
A) Banking
B) Military
C) Healthcare
D) All of the above

Answer
D) All of the above

Which of the following is NOT a cybersecurity threat?
A) Phishing
B) Malware
C) Data Encryption
D) Ransomware

Answer
C) Data Encryption

The Cyber Crime Wing of FIA in Pakistan was established in:
A) 2005
B) 2010
C) 2016
D) 2018

Answer
C) 2016

Which attack involves malicious software demanding a ransom?
A) Spyware
B) Ransomware
C) Trojan Horse
D) Worm

Answer
B) Ransomware

Hybrid warfare mainly exploits:
A) Economic weaknesses
B) Political instability
C) Ethnic divisions
D) All of the above

Answer
D) All of the above

Which country has been accused of interfering in foreign elections through cyber warfare?
A) Russia
B) China
C) USA
D) North Korea

Answer
A) Russia

Which is an example of cyber espionage?
A) Stealing classified military documents
B) Broadcasting propaganda
C) Conducting military drills
D) Economic sanctions

Answer
A) Stealing classified military documents

Which law in Pakistan deals with cybercrime?
A) National Cyber Law
B) Prevention of Electronic Crimes Act (PECA) 2016
C) Digital Protection Act 2020
D) Cyber Security Regulation Act

Answer
B) Prevention of Electronic Crimes Act (PECA) 2016

Which cyber threat is designed to look like a legitimate program but is harmful?
A) Ransomware
B) Trojan Horse
C) Worm
D) Spyware

Answer
B) Trojan Horse

What is social engineering in cyber security?
A) Manipulating people to share sensitive information
B) Using AI for hacking
C) Encrypting data
D) Improving cyber defense strategies

Answer
A) Manipulating people to share sensitive information

Which organization coordinates cyber security efforts in Pakistan?
A) PTA
B) ISPR
C) NR3C (National Response Center for Cyber Crimes)
D) NAB

Answer
C) NR3C (National Response Center for Cyber Crimes)

What is the primary goal of hybrid warfare?
A) Military occupation
B) Economic collapse
C) Destabilization through multiple tactics
D) None of the above

Answer
C) Destabilization through multiple tactics

Which of the following cybersecurity practices can prevent hacking?
A) Using weak passwords
B) Clicking on unknown links
C) Enabling two-factor authentication
D) Ignoring security updates

Answer
C) Enabling two-factor authentication

Which of the following is NOT a component of hybrid warfare?
A) Conventional military operations
B) Cyberattacks
C) Political propaganda
D) Agricultural reforms

Answer
D) Agricultural reforms

What is the purpose of deepfake technology in hybrid warfare?
A) Improving internet speed
B) Creating realistic but fake videos to manipulate public opinion
C) Enhancing cybersecurity
D) Strengthening military communications

Answer
B) Creating realistic but fake videos to manipulate public opinion

Which of the following is an economic tactic in hybrid warfare?
A) Economic sanctions
B) Inflation control
C) Trade agreements
D) None of the above

Answer
A) Economic sanctions

Which cyber-attack spreads without human intervention?
A) Worm
B) Trojan Horse
C) Phishing
D) Spyware

Answer
A) Worm

Which of the following is an example of psychological warfare?
A) Military invasion
B) Cyber espionage
C) Spreading fake news to influence public opinion
D) Hacking bank accounts

Answer
C) Spreading fake news to influence public opinion

Which organization plays a key role in global cyber security?
A) NATO
B) World Bank
C) WHO
D) UNESCO

Answer
A) NATO

What is spear phishing?
A) A fishing technique
B) A targeted cyber attack using fake emails
C) A new type of military weapon
D) A financial scam

Answer
B) A targeted cyber attack using fake emails

Which country faced one of the most significant cyber-attacks in history with the Stuxnet virus?
A) Pakistan
B) Iran
C) USA
D) China

Answer
B) Iran

Which type of attack involves hackers secretly monitoring user activities?
A) Ransomware
B) Phishing
C) Spyware
D) DDoS

Answer
C) Spyware

What is cyber deterrence?
A) Preventing cybercrime by legal actions
B) Using cyber-attacks as a defense strategy
C) Avoiding cybersecurity measures
D) None of the above

Answer
A) Preventing cybercrime by legal actions

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button