Computer

Phishing, Ransomware & Malware MCQs with Answers

What is phishing in cybersecurity?
a) A type of software that protects data
b) Sending fraudulent emails to steal sensitive information
c) A method of encrypting personal data
d) A virus that damages a system

Answer
b) Sending fraudulent emails to steal sensitive information

What is the goal of a ransomware attack?
a) To increase system performance
b) To gain unauthorized access to personal data
c) To demand payment for restoring access to data
d) To protect files from being deleted

Answer
c) To demand payment for restoring access to data

Which of the following is commonly used by attackers in a phishing attack?
a) Fake websites or emails pretending to be legitimate sources
b) High encryption methods
c) Spam emails with no harmful intent
d) Anonymous browsing techniques

Answer
a) Fake websites or emails pretending to be legitimate sources

How does ransomware typically spread?
a) Through infected attachments or links in emails
b) By hacking into a company’s mainframe system
c) Through browsing trusted websites
d) Via secure communication channels

Answer
a) Through infected attachments or links in emails

What is the most common consequence of a successful phishing attack?
a) Gaining access to personal information such as passwords or credit card details
b) Slow system performance
c) Blocking access to websites
d) The spread of malware on the system

Answer
a) Gaining access to personal information such as passwords or credit card details

Which of the following is an example of malware?
a) A legitimate antivirus software
b) A program designed to harm or exploit a computer system
c) A standard operating system update
d) A network firewall

Answer
b) A program designed to harm or exploit a computer system

How can you identify a phishing email?
a) It contains a familiar sender’s address and personalized greeting
b) It includes a call to action, like clicking a link or opening an attachment
c) It comes with a clear subject line and no typos
d) It is from a trusted source without any requests for personal information

Answer
b) It includes a call to action, like clicking a link or opening an attachment

What is the primary purpose of malware?
a) To improve system performance
b) To track user activity for marketing purposes
c) To damage, disrupt, or gain unauthorized access to computer systems
d) To encrypt data for secure storage

Answer
c) To damage, disrupt, or gain unauthorized access to computer systems

Which of the following best describes a “Trojan horse” in terms of malware?
a) A type of phishing email
b) A file or program that appears legitimate but contains harmful code
c) A virus that targets online banking systems
d) A type of encryption used by hackers

Answer
b) A file or program that appears legitimate but contains harmful code

Which of these actions should you avoid to prevent falling victim to ransomware?
a) Regularly backing up your data
b) Clicking on suspicious links or downloading unverified attachments
c) Using strong, unique passwords
d) Keeping your software up to date

Answer
b) Clicking on suspicious links or downloading unverified attachments

What does the term “zero-day exploit” refer to in cybersecurity?
a) A virus that encrypts files and demands a ransom
b) A flaw in software that is exploited before the developer has a chance to fix it
c) A technique used to track user activity online
d) A tool used to prevent phishing attacks

Answer
b) A flaw in software that is exploited before the developer has a chance to fix it

Which of the following can help protect against malware attacks?
a) Installing an antivirus program and keeping it updated
b) Disabling your firewall
c) Ignoring software updates
d) Sharing passwords with others

Answer
a) Installing an antivirus program and keeping it updated

What is the most common way ransomware spreads to computers?
a) Via infected websites
b) Through email attachments or malicious links
c) Through USB drives
d) By exploiting software vulnerabilities

Answer
b) Through email attachments or malicious links

What is a “pharming” attack?
a) A phishing attack via email
b) Redirecting users from legitimate websites to fraudulent ones to steal data
c) Infecting a computer with malware
d) The spread of ransomware through a network

Answer
b) Redirecting users from legitimate websites to fraudulent ones to steal data

What type of data does ransomware typically target?
a) Audio files
b) System files
c) Personal data such as photos, videos, and documents
d) Temporary files

Answer
c) Personal data such as photos, videos, and documents

What should you do if you suspect a phishing email?
a) Open the attachment to check for viruses
b) Ignore it and continue using your email
c) Report the email to your IT department and delete it
d) Click on any links to confirm their legitimacy

Answer
c) Report the email to your IT department and delete it

Which of the following is the best defense against phishing attacks?
a) Relying on antivirus software to detect phishing emails
b) Avoiding clicking on suspicious links and verifying sources
c) Using weak passwords to avoid being targeted
d) Ignoring security alerts from your browser

Answer
b) Avoiding clicking on suspicious links and verifying sources

Which of the following describes a “keylogger”?
a) A malware that encrypts files to hold them hostage
b) A tool that tracks every keystroke on an infected system
c) A virus that causes system crashes
d) A phishing technique used to steal passwords

Answer
b) A tool that tracks every keystroke on an infected system

What should be the first step after identifying a ransomware attack on your system?
a) Pay the ransom immediately
b) Disconnect from the network to prevent further spread
c) Attempt to decrypt the files yourself
d) Delete the ransomware file

Answer
b) Disconnect from the network to prevent further spread

What is the main characteristic of a “worm” in malware?
a) It spreads itself to other systems without user intervention
b) It damages files on a single system
c) It requires a click from the user to activate
d) It only targets web browsers

Answer
a) It spreads itself to other systems without user intervention

Which type of malware can encrypt your data and demand a ransom for its release?
a) Trojan horse
b) Virus
c) Ransomware
d) Worm

Answer
c) Ransomware

What is the primary objective of a DDoS (Distributed Denial of Service) attack?
a) To encrypt data and demand payment
b) To overload a system or website with traffic and cause it to crash
c) To steal user login credentials
d) To install malware on a system

Answer
b) To overload a system or website with traffic and cause it to crash

What is the primary method used by malware to avoid detection?
a) By using strong encryption techniques
b) By disguising itself as legitimate software
c) By requesting user consent to install
d) By remaining inactive until triggered

Answer
b) By disguising itself as legitimate software

What is the purpose of “social engineering” in phishing attacks?
a) To gain access to networks through technical vulnerabilities
b) To manipulate individuals into divulging sensitive information
c) To install keyloggers on infected systems
d) To exploit flaws in operating systems

Answer
b) To manipulate individuals into divulging sensitive information

What is the first sign that your computer may be infected with malware?
a) Increased internet speed
b) Files being encrypted or locked
c) The system starts functioning faster
d) A sudden decrease in available disk space

Answer
b) Files being encrypted or locked

Which of the following is a common strategy used to defend against ransomware?
a) Regularly updating software and patches
b) Deleting all files on your computer
c) Avoiding all forms of encryption
d) Only using public Wi-Fi networks

Answer
a) Regularly updating software and patches

What is “ransomware as a service”?
a) A subscription model for antivirus software
b) A platform where attackers can purchase ransomware tools
c) A legal service to recover data from attacks
d) A software used to prevent phishing attacks

Answer
b) A platform where attackers can purchase ransomware tools

What is one key difference between viruses and worms?
a) Viruses do not replicate; worms do
b) Worms require user interaction to spread; viruses do not
c) Worms replicate and spread automatically, while viruses require user interaction
d) Viruses are harmless, whereas worms steal data

Answer
c) Worms replicate and spread automatically, while viruses require user interaction

What should you do if you receive a suspicious email asking for sensitive information?
a) Ignore it and delete it
b) Respond with the requested information
c) Verify the sender’s identity before taking action
d) Click on the link to confirm its legitimacy

Answer
c) Verify the sender’s identity before taking action

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button