Phishing, Ransomware & Malware MCQs with Answers
What is phishing in cybersecurity?
a) A type of software that protects data
b) Sending fraudulent emails to steal sensitive information
c) A method of encrypting personal data
d) A virus that damages a system
What is the goal of a ransomware attack?
a) To increase system performance
b) To gain unauthorized access to personal data
c) To demand payment for restoring access to data
d) To protect files from being deleted
Which of the following is commonly used by attackers in a phishing attack?
a) Fake websites or emails pretending to be legitimate sources
b) High encryption methods
c) Spam emails with no harmful intent
d) Anonymous browsing techniques
How does ransomware typically spread?
a) Through infected attachments or links in emails
b) By hacking into a company’s mainframe system
c) Through browsing trusted websites
d) Via secure communication channels
What is the most common consequence of a successful phishing attack?
a) Gaining access to personal information such as passwords or credit card details
b) Slow system performance
c) Blocking access to websites
d) The spread of malware on the system
Which of the following is an example of malware?
a) A legitimate antivirus software
b) A program designed to harm or exploit a computer system
c) A standard operating system update
d) A network firewall
How can you identify a phishing email?
a) It contains a familiar sender’s address and personalized greeting
b) It includes a call to action, like clicking a link or opening an attachment
c) It comes with a clear subject line and no typos
d) It is from a trusted source without any requests for personal information
What is the primary purpose of malware?
a) To improve system performance
b) To track user activity for marketing purposes
c) To damage, disrupt, or gain unauthorized access to computer systems
d) To encrypt data for secure storage
Which of the following best describes a “Trojan horse” in terms of malware?
a) A type of phishing email
b) A file or program that appears legitimate but contains harmful code
c) A virus that targets online banking systems
d) A type of encryption used by hackers
Which of these actions should you avoid to prevent falling victim to ransomware?
a) Regularly backing up your data
b) Clicking on suspicious links or downloading unverified attachments
c) Using strong, unique passwords
d) Keeping your software up to date
What does the term “zero-day exploit” refer to in cybersecurity?
a) A virus that encrypts files and demands a ransom
b) A flaw in software that is exploited before the developer has a chance to fix it
c) A technique used to track user activity online
d) A tool used to prevent phishing attacks
Which of the following can help protect against malware attacks?
a) Installing an antivirus program and keeping it updated
b) Disabling your firewall
c) Ignoring software updates
d) Sharing passwords with others
What is the most common way ransomware spreads to computers?
a) Via infected websites
b) Through email attachments or malicious links
c) Through USB drives
d) By exploiting software vulnerabilities
What is a “pharming” attack?
a) A phishing attack via email
b) Redirecting users from legitimate websites to fraudulent ones to steal data
c) Infecting a computer with malware
d) The spread of ransomware through a network
What type of data does ransomware typically target?
a) Audio files
b) System files
c) Personal data such as photos, videos, and documents
d) Temporary files
What should you do if you suspect a phishing email?
a) Open the attachment to check for viruses
b) Ignore it and continue using your email
c) Report the email to your IT department and delete it
d) Click on any links to confirm their legitimacy
Which of the following is the best defense against phishing attacks?
a) Relying on antivirus software to detect phishing emails
b) Avoiding clicking on suspicious links and verifying sources
c) Using weak passwords to avoid being targeted
d) Ignoring security alerts from your browser
Which of the following describes a “keylogger”?
a) A malware that encrypts files to hold them hostage
b) A tool that tracks every keystroke on an infected system
c) A virus that causes system crashes
d) A phishing technique used to steal passwords
What should be the first step after identifying a ransomware attack on your system?
a) Pay the ransom immediately
b) Disconnect from the network to prevent further spread
c) Attempt to decrypt the files yourself
d) Delete the ransomware file
What is the main characteristic of a “worm” in malware?
a) It spreads itself to other systems without user intervention
b) It damages files on a single system
c) It requires a click from the user to activate
d) It only targets web browsers
Which type of malware can encrypt your data and demand a ransom for its release?
a) Trojan horse
b) Virus
c) Ransomware
d) Worm
What is the primary objective of a DDoS (Distributed Denial of Service) attack?
a) To encrypt data and demand payment
b) To overload a system or website with traffic and cause it to crash
c) To steal user login credentials
d) To install malware on a system
What is the primary method used by malware to avoid detection?
a) By using strong encryption techniques
b) By disguising itself as legitimate software
c) By requesting user consent to install
d) By remaining inactive until triggered
What is the purpose of “social engineering” in phishing attacks?
a) To gain access to networks through technical vulnerabilities
b) To manipulate individuals into divulging sensitive information
c) To install keyloggers on infected systems
d) To exploit flaws in operating systems
What is the first sign that your computer may be infected with malware?
a) Increased internet speed
b) Files being encrypted or locked
c) The system starts functioning faster
d) A sudden decrease in available disk space
Which of the following is a common strategy used to defend against ransomware?
a) Regularly updating software and patches
b) Deleting all files on your computer
c) Avoiding all forms of encryption
d) Only using public Wi-Fi networks
What is “ransomware as a service”?
a) A subscription model for antivirus software
b) A platform where attackers can purchase ransomware tools
c) A legal service to recover data from attacks
d) A software used to prevent phishing attacks
What is one key difference between viruses and worms?
a) Viruses do not replicate; worms do
b) Worms require user interaction to spread; viruses do not
c) Worms replicate and spread automatically, while viruses require user interaction
d) Viruses are harmless, whereas worms steal data
What should you do if you receive a suspicious email asking for sensitive information?
a) Ignore it and delete it
b) Respond with the requested information
c) Verify the sender’s identity before taking action
d) Click on the link to confirm its legitimacy