Cyber Quiz
Cyber Quiz
TIME: 30 MIN
1. What does the term "phishing" refer to?
a) A type of computer virus
b) Unauthorized access to a computer system
c) Sending deceptive emails to trick people into revealing sensitive information
d) A type of hacking technique
2. Which of the following is an example of a strong password?
a) Password123
b) 123456
c) P@ssw0rd!
d) YourName123
3. What is the purpose of a firewall?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To speed up internet connection
d) To enhance computer performance
4. Which of the following is a type of malware?
a) Firewall
b) Antivirus
c) Adware
d) Router
5. What is the main function of an antivirus software?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To speed up internet connection
d) To detect and remove malware from a computer
6. What does the term "encryption" mean?
a) The process of converting data into a secret code
b) The process of deleting data permanently
c) The process of copying data from one location to another
d) The process of compressing data to save storage space
7. What is a computer virus?
a) A physical damage to a computer system
b) A type of malware that spreads and infects files
c) A software program that enhances computer performance
d) A device that connects computers in a network
8. What is the purpose of a backup?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To create additional copies of important data for recovery purposes
d) To enhance computer performance
9. What is a firewall?
a) A physical barrier used to protect a computer from viruses
b) A software program that protects a computer from malware
c) A device that connects computers in a network
d) A type of computer virus
10. What is the purpose of an operating system?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To coordinate and manage computer hardware and software resources
d) To enhance computer performance
11. What does the term "phishing" refer to?
a) A type of computer virus
b) Unauthorized access to a computer system
CYBER CLUB QUIZ
TIME: 30 MIN
c) Sending deceptive emails to trick people into revealing sensitive information
d) A type of hacking technique
12. Which of the following is an example of a strong password?
a) Password123
b) 123456
c) P@ssw0rd!
d) YourName123
13. What is the purpose of a firewall?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To speed up internet connection
d) To enhance computer performance
14. Which of the following is a type of malware?
a) Firewall
b) Antivirus
c) Adware
d) Router
15. What is the main function of an antivirus software?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To speed up internet connection
d) To detect and remove malware from a computer
16. What does the term "encryption" mean?
a) The process of converting data into a secret code
b) The process of deleting data permanently
c) The process of copying data from one location to another
d) The process of compressing data to save storage space
17. What is a computer virus?
a) A physical damage to a computer system
b) A type of malware that spreads and infects files
c) A software program that enhances computer performance
d) A device that connects computers in a network
18. What is the purpose of a backup?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To create additional copies of important data for recovery purposes
d) To enhance computer performance
19. What is a firewall?
a) A physical barrier used to protect a computer from viruses
b) A software program that protects a computer from malware
c) A device that connects computers in a network
d) A type of computer virus
20. What does the term "phishing" refer to?
a) A type of computer virus
b) Unauthorized access to a computer system
c) Sending deceptive emails to trick people into revealing sensitive information
d) A type of hacking technique
21. Which of the following is an example of a strong password?
a) Password123
b) 123456
c) P@ssw0rd!
d) YourName123
CYBER CLUB QUIZ
TIME: 30 MIN
22. What is the purpose of a firewall?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To speed up internet connection
d) To enhance computer performance
23. Which of the following is a type of malware?
a) Firewall
b) Antivirus
c) Adware
d) Router
24. What is the main function of an antivirus software?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To speed up internet connection
d) To detect and remove malware from a computer
25. What does the term "encryption" mean?
a) The process of converting data into a secret code
b) The process of deleting data permanently
c) The process of copying data from one location to another
d) The process of compressing data to save storage space
26. What is a computer virus?
a) A physical damage to a computer system
b) A type of malware that spreads and infects files
c) A software program that enhances computer performance
d) A device that connects computers in a network
27. What is the purpose of a backup?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To create additional copies of important data for recovery purposes
d) To enhance computer performance
28. What is a firewall?
a) A physical barrier used to protect a computer from viruses
b) A software program that protects a computer from malware
c) A device that connects computers in a network
d) A type of computer virus
29. What is the purpose of an operating system?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To coordinate and manage computer hardware and software resources
d) To enhance computer performance
30. What is the difference between a virus and a worm?
a) A virus requires human interaction to spread, while a worm spreads automatically
b) A virus is a type of malware, while a worm is a hardware component
c) A virus can only infect files, while a worm can infect both files and hardware
d) There is no difference, they are the same thing
31. What is the purpose of a CAPTCHA?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To verify that a user is human and not a bot
d) To enhance computer performance
32. What is the difference between HTTP and HTTPS?
a) HTTP is a secure protocol, while HTTPS is not
b) HTTP is used for web browsing, while HTTPS is used for email communication
CYBER CLUB QUIZ
TIME: 30 MIN
c) HTTP encrypts data, while HTTPS does not
d) HTTPS is a secure protocol that encrypts data during transmission
33. What is a keylogger?
a) A device used to lock and unlock computer systems
b) A software program that records keystrokes on a computer
c) A type of malware that spreads through removable storage devices
d) A tool used to recover lost or forgotten passwords
34. What is the purpose of a VPN?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To create a secure and private connection over a public network
d) To enhance computer performance
35. What is the difference between symmetric and asymmetric encryption?
a) Symmetric encryption uses the same key for both encryption and decryption, while
asymmetric encryption uses different keys
b) Symmetric encryption is more secure than asymmetric encryption
c) Symmetric encryption is faster than asymmetric encryption
d) There is no difference, they are the same thing
36. What is a botnet?
a) A group of computers that work together to perform a specific task
b) A type of malware that infects computer networks
c) A software program that enhances computer performance
d) A device used to connect computers in a network
37. What is social engineering?
a) The use of psychological manipulation to deceive individuals into revealing sensitive
information or performing actions they wouldn't normally do
b) The process of improving social interactions on online platforms
c) The study of human behavior in social settings
d) The practice of creating social networks for cybersecurity professionals
38. What is a denial-of-service (DoS) attack?
a) A type of malware that denies access to a computer system
b) An attack that floods a network or website with traffic, rendering it inaccessible
c) A technique used to gain unauthorized access to a computer system
d) A security measure that prevents unauthorized access to a network
39. What is two-factor authentication (2FA)?
a) A method of authentication that uses two different passwords
b) A technique that identifies users based on their physical characteristics
c) A security measure that requires users to provide two different types of credentials to
access an account
d) A type of encryption used to secure network communications
40. What is a cookie in the context of web browsing?
a) A small text file stored on a user's computer that contains information about their browsing
activity
b) A type of malware that steals sensitive information from web browsers
c) A tool used to block unwanted advertisements on websites
d) A security feature that prevents unauthorized access to websites
41. What is the purpose of a virtual machine?
a) To simulate a physical computer within a computer, allowing multiple operating systems to
run simultaneously
b) To provide a secure environment for storing sensitive data
c) To enhance the performance of a computer by allocating additional resources
d) To protect against physical damage to a computer
CYBER CLUB QUIZ
TIME: 30 MIN
42. What is the difference between a virus and malware?
a) A virus is a type of malware that spreads and infects files, while malware is a broader term
that encompasses various malicious software
b) There is no difference, they are the same thing
c) A virus is designed to target hardware components, while malware targets software
d) A virus can only infect computers connected to a network, while malware can infect any
computer
43. What is the purpose of a proxy server?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To act as an intermediary between a user and the internet, hiding their IP address
d) To enhance computer performance
44. What is a vulnerability in the context of cybersecurity?
a) A weak point or flaw in a system that can be exploited by attackers
b) A type of malware that spreads rapidly through a network
c) A security measure that detects and blocks malicious activities
d) A software program that enhances computer performance
45. What is the difference between a virus and a Trojan horse?
a) A virus is a type of malware that spreads and infects files, while a Trojan horse is a
malicious program disguised as legitimate software
b) There is no difference, they are the same thing
c) A virus can only infect computers connected to a network, while a Trojan horse can infect
any computer
d) A virus is designed to target hardware components, while a Trojan horse targets software
46. What is the purpose of a strong firewall configuration?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To speed up internet connection
d) To enhance computer performance
47. What is the role of an ethical hacker?
a) To gain unauthorized access to computer systems for personal gain
b) To protect computer systems by identifying vulnerabilities and securing them
c) To spread malware and disrupt computer networks
d) To monitor and track cybercriminal activities
48. What is the difference between a virus and a ransomware?
a) A virus is a type of malware that spreads and infects files, while ransomware is a malicious
program that encrypts files and demands a ransom
b) There is no difference, they are the same thing
c) A virus can only infect computers connected to a network, while ransomware can infect
any computer
d) A virus spreads through physical contact, while ransomware spreads through email
attachments
49. What is the purpose of a digital certificate?
a) To protect against physical damage to a computer
b) To prevent unauthorized access to a computer network
c) To verify the authenticity and integrity of electronic documents or communications
d) To enhance computer performance
50. What is the difference between a hacker and a cracker?
a) A hacker is a cybersecurity professional, while a cracker is a malicious attacker
b) There is no difference, they are the same thing
c) A hacker uses theirSure! Here's some more information: