SSC CGL Preparation – Day 16

MCQs – Network and Information Security Threats


1. What type of malware locks your data and demands payment for release?
A) Trojan
B) Spyware
C) Ransomware
D) Worm
➤ Answer: C) Ransomware


2. Which attack attempts to overload a network or server, making it unavailable to users?
A) SQL Injection
B) Denial of Service (DoS)
C) Man-in-the-Middle
D) Phishing
➤ Answer: B) Denial of Service (DoS)


3. What is the main purpose of phishing?
A) To destroy data
B) To track internet activity
C) To steal personal and sensitive information
D) To update antivirus software
➤ Answer: C) To steal personal and sensitive information


4. Which malware secretly records everything typed on a keyboard?
A) Adware
B) Keylogger
C) Worm
D) Virus
➤ Answer: B) Keylogger


5. Which of the following is an example of a social engineering attack?
A) SQL Injection
B) Man-in-the-Middle
C) Phishing email
D) Brute Force
➤ Answer: C) Phishing email


6. What kind of attack involves injecting malicious code into an input field to access a database?
A) Virus
B) Trojan
C) SQL Injection
D) Ransomware
➤ Answer: C) SQL Injection


7. What does a Trojan horse malware do?
A) Destroys system files instantly
B) Encrypts user files
C) Pretends to be a legitimate software but harms the system
D) Steals electricity from your computer
➤ Answer: C) Pretends to be a legitimate software but harms the system


8. Which of the following is NOT a type of malware?
A) Ransomware
B) Worm
C) Router
D) Virus
➤ Answer: C) Router


9. In a Man-in-the-Middle attack, the hacker:
A) Shuts down the server
B) Blocks incoming traffic
C) Intercepts communication between two parties
D) Sends multiple login requests
➤ Answer: C) Intercepts communication between two parties


10. What is a Zero-Day attack?
A) Attack on a public holiday
B) Attack before a software vulnerability is known to the vendor
C) Attack launched from within a system
D) Attack that happens daily
➤ Answer: B) Attack before a software vulnerability is known to the vendor

Leave a Reply

Your email address will not be published. Required fields are marked *