MCQ CHALLENGE FOR KAS PRELIMS – DAY 28

MCQ CHALLENGE FOR KAS PRELIMS – DAY 28

1. Which of the following is an example of a phishing attack?
A) Sending malicious emails disguised as legitimate
B) Brute-forcing passwords
C) Installing anti-virus software
D) Encrypting data with a secure algorithm
2. What does the term “ransomware” refer to in cybersecurity?
A) A type of attack that involves stealing credit card information
B) Malicious software that encrypts data and demands payment for its release
C) Software that blocks internet access to unauthorized users
D) A method for secure data transfer
3. Which of the following is NOT considered a strong password policy?
A) Use of uppercase and lowercase letters, numbers, and symbols
B) Changing passwords frequently
C) Using a common word or name as a password
D) Avoiding password reuse across multiple sites
4. Which of the following protocols is used to secure communications over the internet?
A) HTTP
B) FTP
C) HTTPS
D) SMTP
5. Which of the following is NOT a type of malware?
A) Worm
B) Trojan
C) Firewall
D) Spyware
6. In cybersecurity, what does “DoS” stand for?
A) Data on Security
B) Denial of Service
C) Device Overload Syndrome
D) Digital Operating System
7. Which of the following is a best practice for protecting your online accounts?
A) Using the same password across multiple sites
B) Enabling two-factor authentication (2FA)
C) Sharing passwords with trusted friends
D) Disabling automatic software updates
8. What is the primary purpose of a firewall?
A) To prevent unauthorized access to or from a private network
B) To back up data regularly
C) To encrypt sensitive information
D) To generate complex passwords for users
9. Which of the following is an effective method for preventing a brute-force attack?
A) Using CAPTCHA challenges
B) Disabling two-factor authentication
C) Shortening password lengths
D) Sharing network credentials with others
10. What is the main goal of encryption in cybersecurity?
A) To create complex passwords
B) To protect data by converting it into an unreadable format
C) To prevent network traffic
D) To block access to social media platforms