1. Which of the following is the most common method for delivering malware?
π A) Sending a malicious USB drive via mail
π B) Phishing emails with malicious attachments
π C) Posting malware on social media
π D) Printing QR codes on physical flyers
β
Answer: B) Phishing emails with malicious attachments
π Explanation: Phishing emails are the most widely used method to deliver malware, often containing malicious links or attachments that trick users into executing harmful code.
2. What is a common characteristic of drive-by downloads?
π A) They require explicit user permission before execution
π B) They exploit vulnerabilities in browsers and plugins
π C) They are only delivered via email
π D) They require users to click on a pop-up warning
β
Answer: B) They exploit vulnerabilities in browsers and plugins
π Explanation: Drive-by downloads occur when a user visits a compromised website, which automatically downloads and executes malware by exploiting browser or plugin vulnerabilities.
3. How can hackers use USB devices to spread malware?
π A) By disguising malware as a movie file
π B) By using autorun features to execute malware automatically
π C) By requiring users to install a special driver
π D) By hiding malware inside Wi-Fi signals
β
Answer: B) By using autorun features to execute malware automatically
π Explanation: Some malware-laden USBs exploit the autorun feature, which can automatically execute a malicious file once plugged into a computer.
4. What technique is commonly used in malvertising?
π A) Malware embedded in video games
π B) Hiding malicious code inside advertisements on legitimate websites
π C) Sending malware via Bluetooth spam
π D) Encrypting malware inside images
β
Answer: B) Hiding malicious code inside advertisements on legitimate websites
π Explanation: Malvertising involves injecting malicious ads into ad networks, which then appear on legitimate websites and can infect users who click on them.
5. What is a watering hole attack?
π A) Infecting websites frequently visited by a target group
π B) Spreading malware through public drinking water systems
π C) Hacking only high-security government websites
π D) Infecting computers using phishing emails
β
Answer: A) Infecting websites frequently visited by a target group
π Explanation: A watering hole attack infects specific websites that are commonly visited by the target audience, leading to malware infections.
6. How does ransomware typically spread?
π A) Phishing emails and exploit kits
π B) Directly modifying system BIOS
π C) Only through infected USB drives
π D) Manually installed by attackers on physical computers
β
Answer: A) Phishing emails and exploit kits
π Explanation: Ransomware is commonly spread through phishing emails that contain malicious attachments or links, as well as exploit kits that take advantage of software vulnerabilities.
7. What is an exploit kit?
π A) A toolkit used by developers to test exploits
π B) A collection of vulnerabilities that automate malware infection
π C) A security tool to detect malware
π D) A set of antivirus software features
β
Answer: B) A collection of vulnerabilities that automate malware infection
π Explanation: Exploit kits are automated tools used by cybercriminals to scan for and exploit vulnerabilities on a user’s device to deliver malware.
8. What is a trojanized application?
π A) A legitimate app containing hidden malware
π B) An application that can only be installed on a Trojan horse
π C) A security software designed to fight trojans
π D) A program that removes all malware from a system
β
Answer: A) A legitimate app containing hidden malware
π Explanation: A trojanized application appears to be legitimate software but contains hidden malicious code that executes when installed.
9. What role do botnets play in malware distribution?
π A) They directly execute malware on infected machines
π B) They distribute malware to other devices through coordinated attacks
π C) They are used for removing malware
π D) They are security tools used by ethical hackers
β
Answer: B) They distribute malware to other devices through coordinated attacks
π Explanation: Botnets consist of compromised machines controlled by an attacker to distribute malware, launch DDoS attacks, and perform other malicious activities.
10. What makes spear phishing more dangerous than regular phishing?
π A) It targets specific individuals with customized messages
π B) It is only used by nation-state attackers
π C) It requires physical access to the victimβs computer
π D) It is undetectable by all security software
β
Answer: A) It targets specific individuals with customized messages
π Explanation: Spear phishing is a targeted attack where attackers craft personalized emails to deceive specific victims into opening malicious attachments or links.
11. What is βMalware-as-a-Service (MaaS)β in the cybercrime industry?
π A) A legitimate cybersecurity service for malware testing
π B) Cybercriminals selling pre-made malware to others
π C) A cloud-based malware scanner
π D) A service offered by antivirus companies
β
Answer: B) Cybercriminals selling pre-made malware to others
π Explanation: Malware-as-a-Service (MaaS) allows criminals to rent or buy malware, enabling even non-technical attackers to deploy sophisticated threats.
12. Which network protocol is commonly abused to spread malware in corporate environments?
π A) FTP (File Transfer Protocol)
π B) SMB (Server Message Block)
π C) SNMP (Simple Network Management Protocol)
π D) DNS (Domain Name System)
β
Answer: B) SMB (Server Message Block)
π Explanation: SMB is frequently exploited for lateral movement within networks, as seen in attacks like WannaCry and EternalBlue.
13. What is the primary function of a Command and Control (C2) server in malware attacks?
π A) To distribute software updates
π B) To communicate with and control infected devices
π C) To provide encryption for malware
π D) To detect and remove malware from networks
β
Answer: B) To communicate with and control infected devices
π Explanation: C2 servers allow attackers to send commands to infected machines, execute malware remotely, and exfiltrate data.
14. What is an example of fileless malware?
π A) A malicious PDF attachment
π B) A trojanized mobile app
π C) A PowerShell script executing malicious commands in memory
π D) A self-replicating virus
β
Answer: C) A PowerShell script executing malicious commands in memory
π Explanation: Fileless malware operates in memory without leaving files on disk, making it harder for antivirus software to detect.
15. Which type of file is most commonly used in phishing emails to deliver malware?
π A) Executable (.exe) files
π B) Microsoft Office documents with macros
π C) Audio (.mp3) files
π D) ZIP archives with images
β
Answer: B) Microsoft Office documents with macros
π Explanation: Attackers embed malicious macros in Office files (e.g., .docm, .xlsm) to execute malware when opened by users.
16. How do cybercriminals use steganography to distribute malware?
π A) By using deepfake videos to trick victims
π B) By hiding malicious code inside images, videos, or audio files
π C) By encrypting malware with public keys
π D) By spoofing DNS records to redirect users
β
Answer: B) By hiding malicious code inside images, videos, or audio files
π Explanation: Steganography allows attackers to conceal malicious payloads within seemingly innocent media files.
17. What is a key characteristic of polymorphic malware?
π A) It constantly changes its code to evade detection
π B) It only affects mobile devices
π C) It disables antivirus software permanently
π D) It spreads exclusively via social media
β
Answer: A) It constantly changes its code to evade detection
π Explanation: Polymorphic malware modifies its signature and code on each infection, making signature-based detection difficult.
18. What is an example of social engineering for malware delivery?
π A) Exploiting a zero-day vulnerability
π B) Tricking users into installing fake security updates
π C) Using a botnet for DDoS attacks
π D) Encrypting malware files with strong algorithms
β
Answer: B) Tricking users into installing fake security updates
π Explanation: Fake software updates (e.g., “Update your Flash Player” scams) trick users into downloading malware.
19. How can attackers use cloud services for malware distribution?
π A) Hosting malicious payloads on cloud storage services
π B) Encrypting all user data in the cloud
π C) Running malware inside containerized environments
π D) Exploiting misconfigured cloud backup systems
β
Answer: A) Hosting malicious payloads on cloud storage services
π Explanation: Attackers upload malware to platforms like Google Drive, Dropbox, and AWS, disguising it as legitimate files.
20. What is the main advantage of using encrypted malware communication?
π A) It makes malware impossible to detect
π B) It prevents security analysts from reversing the malware
π C) It avoids detection by network security tools
π D) It allows malware to run without internet access
β
Answer: C) It avoids detection by network security tools
π Explanation: Encrypted malware traffic (e.g., TLS-encrypted C2 communication) prevents security tools from inspecting malicious payloads.
21. How do attackers use rogue Wi-Fi hotspots to deliver malware?
π A) By displaying fake Captcha screens
π B) By injecting malicious code into unencrypted traffic
π C) By using RFID skimming techniques
π D) By distributing malware through SMS messages
β
Answer: B) By injecting malicious code into unencrypted traffic
π Explanation: Attackers set up rogue Wi-Fi hotspots to intercept and inject malware into HTTP traffic.
22. What is a macro virus?
π A) A virus that infects only kernel-level processes
π B) Malware embedded in document macros
π C) A Linux-only trojan
π D) A highly advanced polymorphic virus
β
Answer: B) Malware embedded in document macros
π Explanation: Macro viruses are malicious scripts embedded in Office documents that execute when macros are enabled.
23. How can QR codes be used for malware delivery?
π A) By embedding malicious URLs in QR codes
π B) By storing malware files directly inside QR images
π C) By encrypting malware payloads with QR cryptography
π D) By bypassing antivirus protection using QR-based malware
β
Answer: A) By embedding malicious URLs in QR codes
π Explanation: Attackers create QR codes that redirect users to malware-infected sites when scanned.
24. What type of malware disguises itself as a legitimate program?
π A) Worm
π B) Trojan Horse
π C) Adware
π D) Botnet
β
Answer: B) Trojan Horse
π Explanation: Trojan malware appears as a legitimate program but contains hidden malicious functionality.
25. What technique allows malware to persist even after rebooting?
π A) Registry modifications
π B) Encrypting the MBR (Master Boot Record)
π C) Running in kernel mode
π D) Using code obfuscation
β
Answer: A) Registry modifications
π Explanation: Malware often adds itself to Windows Registry startup keys to ensure persistence.
26. What is an example of malware delivered via supply chain attacks?
π A) Stuxnet
π B) Petya ransomware
π C) EternalBlue exploit
π D) DNS hijacking
β
Answer: A) Stuxnet
π Explanation: Stuxnet was delivered through compromised industrial software updates, a classic supply chain attack.
27. How do attackers spread malware through Discord and Telegram?
π A) By using chatbots to send malicious commands
π B) By distributing malware-infected files and links
π C) By modifying users’ profile settings remotely
π D) By launching DDoS attacks against servers
β
Answer: B) By distributing malware-infected files and links
π Explanation: Attackers upload infected files to chat platforms like Discord and Telegram to distribute malware.
28. What is rogue software?
π A) Legitimate software with minor vulnerabilities
π B) Fake security programs that deliver malware
π C) Outdated applications
π D) A program that runs on rogue operating systems
β
Answer: B) Fake security programs that deliver malware
π Explanation: Rogue software (e.g., fake antivirus programs) tricks users into installing malware.
29. Which type of attack exploits legitimate software updates to deliver malware?
π A) Supply Chain Attack
π B) Zero-Day Attack
π C) Keylogger Attack
π D) Social Engineering Attack
β
Answer: A) Supply Chain Attack
π Explanation: A supply chain attack occurs when attackers compromise software updates or developer tools to distribute malware to many users.
30. What is a botnet primarily used for in malware distribution?
π A) Launching DDoS attacks
π B) Spreading malware to other devices
π C) Encrypting files for ransomware
π D) Scanning networks for open ports
β
Answer: B) Spreading malware to other devices
π Explanation: A botnet consists of infected computers controlled by an attacker, often used to distribute malware to new victims.
31. How do attackers use browser extensions for malware distribution?
π A) By inserting malicious scripts into web pages
π B) By using browser extensions as keyloggers
π C) By injecting ads that redirect to malicious sites
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious browser extensions can steal data, act as keyloggers, and insert malicious ads or scripts into web pages.
32. How does malspam (malicious spam) distribute malware?
π A) By sending phishing emails with malware attachments
π B) By infecting legitimate websites with malicious code
π C) By using RFID-based attacks
π D) By exploiting weaknesses in mobile networks
β
Answer: A) By sending phishing emails with malware attachments
π Explanation: Malspam delivers malware through phishing emails, often with infected attachments or malicious links.
33. What is a rogue access point in malware attacks?
π A) A fake Wi-Fi network used to inject malware
π B) A security feature of firewalls
π C) A hacking tool used by ethical hackers
π D) A legitimate feature of VPNs
β
Answer: A) A fake Wi-Fi network used to inject malware
π Explanation: Attackers create rogue access points to trick users into connecting, allowing them to inject malware into traffic.
34. How do cybercriminals use Remote Access Trojans (RATs) to distribute malware?
π A) By gaining full control over the victimβs device
π B) By tricking users into executing a trojanized file
π C) By using keyloggers to steal credentials
π D) All of the above
β
Answer: D) All of the above
π Explanation: RATs allow attackers to take full control of a victim’s machine, log keystrokes, and install additional malware.
35. What is the primary danger of malware spread via torrent downloads?
π A) Users might download copyrighted content
π B) Attackers embed malware in pirated software and media files
π C) Torrent clients are known to be vulnerable to attacks
π D) Torrenting increases CPU usage
β
Answer: B) Attackers embed malware in pirated software and media files
π Explanation: Many pirated software downloads contain trojans, keyloggers, or ransomware, making torrents a common malware delivery vector.
36. How can cybercriminals distribute malware through fake tech support scams?
π A) By convincing users to install remote access tools
π B) By exploiting vulnerabilities in outdated browsers
π C) By performing automated brute force attacks
π D) By encrypting user data remotely
β
Answer: A) By convincing users to install remote access tools
π Explanation: Fake tech support scams trick users into installing malware disguised as “security fixes” or “remote support tools.”
37. What is the primary method of malware distribution in mobile devices?
π A) Fake apps from third-party app stores
π B) Bluetooth attacks
π C) QR code-based phishing
π D) Social engineering
β
Answer: A) Fake apps from third-party app stores
π Explanation: Attackers upload trojanized apps to third-party app stores, tricking users into installing malware.
38. What is the purpose of rootkits in malware attacks?
π A) To gain persistent, hidden access to a system
π B) To execute DDoS attacks on web servers
π C) To encrypt user data for ransom
π D) To send phishing emails
β
Answer: A) To gain persistent, hidden access to a system
π Explanation: Rootkits allow malware to operate stealthily, hiding its presence from antivirus software.
39. How do attackers use SEO poisoning for malware distribution?
π A) By manipulating search engine results to lead users to infected sites
π B) By hacking search engine algorithms directly
π C) By tricking users into disabling browser security settings
π D) By embedding malware into website banners
β
Answer: A) By manipulating search engine results to lead users to infected sites
π Explanation: SEO poisoning involves tricking search engines into ranking malicious sites higher in results.
40. What is the role of exploit kits in malware distribution?
π A) They automate the exploitation of system vulnerabilities
π B) They distribute security patches for vulnerabilities
π C) They prevent malware from being detected
π D) They are used only in ethical hacking
β
Answer: A) They automate the exploitation of system vulnerabilities
π Explanation: Exploit kits scan for unpatched vulnerabilities and automate malware infection.
41. What is a major risk of using cracked software?
π A) It may contain embedded malware
π B) It can slow down system performance
π C) It is often detected by firewalls
π D) It increases the cost of digital licensing
β
Answer: A) It may contain embedded malware
π Explanation: Many cracked software versions include trojans, spyware, or ransomware.
42. How does clipboard hijacking work in malware attacks?
π A) Malware replaces copied cryptocurrency wallet addresses
π B) It steals clipboard data for spam messages
π C) It prevents users from copying passwords
π D) It corrupts clipboard files permanently
β
Answer: A) Malware replaces copied cryptocurrency wallet addresses
π Explanation: Clipboard hijackers monitor copied text and replace crypto wallet addresses with attacker-controlled ones.
43. How does “clickjacking” contribute to malware distribution?
π A) By tricking users into clicking hidden malicious elements
π B) By replacing browser homepages with phishing pages
π C) By hijacking social media accounts
π D) By executing brute force attacks
β
Answer: A) By tricking users into clicking hidden malicious elements
π Explanation: Clickjacking overlays invisible elements on legitimate web pages, making users unknowingly trigger malware downloads.
44. How do cybercriminals use email spoofing for malware distribution?
π A) By making phishing emails appear to come from trusted senders
π B) By sending malware directly from legitimate security firms
π C) By hacking into victims’ email accounts
π D) By embedding malware in email attachments
β
Answer: A) By making phishing emails appear to come from trusted senders
π Explanation: Email spoofing makes malicious emails appear legitimate, increasing the likelihood of successful infections.
45. How do malicious browser push notifications distribute malware?
π A) By forcing users to download files via JavaScript
π B) By displaying fake system alerts that lead to malware sites
π C) By modifying browser security settings remotely
π D) By using browser extensions to install malware automatically
β
Answer: B) By displaying fake system alerts that lead to malware sites
π Explanation: Malicious push notifications trick users into clicking fake alerts, which redirect them to malware-infected websites.
46. How does DNS hijacking enable malware distribution?
π A) By redirecting users to malicious websites without their knowledge
π B) By modifying domain registration records
π C) By launching DDoS attacks on DNS servers
π D) By encrypting DNS traffic to hide malware
β
Answer: A) By redirecting users to malicious websites without their knowledge
π Explanation: DNS hijacking manipulates domain resolution, redirecting users to phishing or malware-infected sites.
47. What is scareware?
π A) Malware that encrypts files for ransom
π B) Fake security alerts that trick users into downloading malware
π C) Malware that deletes files after a countdown
π D) A tool used by hackers to remove security software
β
Answer: B) Fake security alerts that trick users into downloading malware
π Explanation: Scareware displays fake warnings (e.g., “Your PC is infected!”) to trick users into downloading malicious software.
48. What is a fake codec scam?
π A) A method where attackers trick users into installing malware disguised as a video codec
π B) A technique for bypassing antivirus detection
π C) A browser exploit that modifies JavaScript execution
π D) A way to inject malware into online streaming services
β
Answer: A) A method where attackers trick users into installing malware disguised as a video codec
π Explanation: Fake codec scams prompt users to install a “required codec” to play a video, but the download contains malware.
49. How does spyware typically distribute itself?
π A) Through trojanized applications and freeware downloads
π B) Only via infected USB devices
π C) By exploiting hardware vulnerabilities
π D) By modifying operating system files
β
Answer: A) Through trojanized applications and freeware downloads
π Explanation: Spyware is often hidden in freeware, trojanized apps, and phishing emails, secretly collecting user data.
50. How does malware hide inside legitimate email attachments?
π A) By embedding malicious scripts in Word, Excel, or PDF files
π B) By modifying the email’s metadata
π C) By encrypting itself within ZIP archives
π D) By exploiting email headers
β
Answer: A) By embedding malicious scripts in Word, Excel, or PDF files
π Explanation: Malware often hides in document macros or PDF exploits, executing when the user opens the file.
51. What is Fast Flux, and how is it used in malware distribution?
π A) A technique to rapidly change DNS records to hide malware servers
π B) A type of high-speed ransomware attack
π C) A botnet that spreads through email attachments
π D) A method of injecting malware into fast-loading web pages
β
Answer: A) A technique to rapidly change DNS records to hide malware servers
π Explanation: Fast Flux allows attackers to quickly rotate IP addresses, making it harder to take down malicious infrastructure.
52. How do cybercriminals use cryptocurrency mining malware (cryptojacking)?
π A) By hijacking CPU or GPU resources to mine cryptocurrency
π B) By stealing cryptocurrency from digital wallets
π C) By encrypting cryptocurrency transactions
π D) By disguising themselves as legitimate crypto trading platforms
β
Answer: A) By hijacking CPU or GPU resources to mine cryptocurrency
π Explanation: Cryptojacking malware secretly uses a victimβs computing power to mine cryptocurrency for the attacker.
53. How do hackers use social media to spread malware?
π A) By posting malicious links disguised as viral content
π B) By hacking social media accounts to send malware-infected messages
π C) By embedding malware in downloadable “cheat” files for games
π D) All of the above
β
Answer: D) All of the above
π Explanation: Hackers exploit social media by spreading malicious links, phishing scams, and infected downloads.
54. What is a rogue software update attack?
π A) An attack where malware is disguised as a legitimate software update
π B) A method of bypassing firewalls
π C) A way to disable antivirus software
π D) A vulnerability in cloud storage systems
β
Answer: A) An attack where malware is disguised as a legitimate software update
π Explanation: Attackers fake software updates (e.g., “Update your browser”) to trick users into installing malware.
55. How do attackers use malicious shortened URLs for malware distribution?
π A) By disguising malware links in shortened URLs (e.g., Bit.ly, TinyURL)
π B) By injecting malware into URL shortening services
π C) By exploiting social media preview features
π D) By modifying DNS settings remotely
β
Answer: A) By disguising malware links in shortened URLs (e.g., Bit.ly, TinyURL)
π Explanation: Shortened URLs hide malicious domains, leading victims to malware-infected sites.
56. What is an example of malware being spread through pirated software?
π A) Keygen programs containing trojans
π B) Open-source software hosting malware
π C) Encrypted email attachments
π D) DNS tunneling attacks
β
Answer: A) Keygen programs containing trojans
π Explanation: Many pirated software “keygens” contain hidden malware, infecting users when executed.
57. How do attackers use malspam campaigns to distribute malware?
π A) By sending mass phishing emails with malicious attachments
π B) By hacking into email servers directly
π C) By modifying antivirus signature databases
π D) By injecting malware into cloud storage accounts
β
Answer: A) By sending mass phishing emails with malicious attachments
π Explanation: Malspam campaigns use phishing emails to spread trojans, ransomware, and keyloggers.
58. How does mobile malware spread through SMS phishing (smishing)?
π A) By sending fake text messages containing malicious links
π B) By modifying SIM card encryption keys
π C) By executing remote exploits via Bluetooth
π D) By forcing users to install firewall software
β
Answer: A) By sending fake text messages containing malicious links
π Explanation: Smishing tricks users into clicking malicious links in SMS messages, leading to malware infections.
59. What is the main way ransomware spreads in corporate networks?
π A) Exploiting unpatched vulnerabilities and phishing attacks
π B) Sending direct messages on social media
π C) Infecting mobile devices first
π D) Encrypting open-source software
β
Answer: A) Exploiting unpatched vulnerabilities and phishing attacks
π Explanation: Ransomware often spreads via phishing emails and unpatched security flaws.
60. How does banking malware steal financial credentials?
π A) By using keyloggers to capture typed credentials
π B) By injecting malicious scripts into banking websites
π C) By hijacking online banking sessions
π D) All of the above
β
Answer: D) All of the above
π Explanation: Banking malware steals credentials through keylogging, web injection, and session hijacking.
61. What is the primary way malware is delivered through cloud services?
π A) Hosting malicious files on cloud storage platforms
π B) Exploiting encryption algorithms
π C) Modifying SSL certificates
π D) Injecting malware into browser cookies
β
Answer: A) Hosting malicious files on cloud storage platforms
π Explanation: Attackers upload malware to Google Drive, Dropbox, AWS, or other cloud platforms and share infected links.
62. How do attackers use rogue Android applications to distribute malware?
π A) By embedding malicious payloads in fake apps
π B) By modifying legitimate apps with additional malicious code
π C) By publishing apps on third-party app stores instead of Google Play
π D) All of the above
β
Answer: D) All of the above
π Explanation: Cybercriminals create fake or modified Android apps and distribute them through third-party app stores.
63. What is a watering hole attack?
π A) Compromising websites frequently visited by a target group
π B) Sending phishing emails to employees of a company
π C) Using malware to overload servers
π D) Infecting mobile apps with spyware
β
Answer: A) Compromising websites frequently visited by a target group
π Explanation: Attackers inject malware into trusted websites frequented by specific victims.
64. How do hackers use IoT devices to distribute malware?
π A) By compromising vulnerable IoT devices to spread malware to other systems
π B) By executing ransomware directly on IoT devices
π C) By modifying the firmware of IoT devices to self-destruct
π D) By using IoT devices to distribute spam emails
β
Answer: A) By compromising vulnerable IoT devices to spread malware to other systems
π Explanation: IoT malware can infect routers, cameras, and smart devices, creating botnets for further malware distribution.
65. How does steganography help in malware delivery?
π A) By hiding malicious code inside images, audio, or video files
π B) By encrypting malware payloads
π C) By using hidden folders to store malware
π D) By embedding malware in PDFs
β
Answer: A) By hiding malicious code inside images, audio, or video files
π Explanation: Steganography conceals malware payloads inside media files, bypassing antivirus detection.
66. How do attackers spread malware via file-sharing platforms?
π A) By uploading infected executables disguised as software updates
π B) By injecting malware into live streaming services
π C) By modifying the metadata of shared files
π D) By hacking into platform databases
β
Answer: A) By uploading infected executables disguised as software updates
π Explanation: Malware is often distributed disguised as popular software, cracks, or keygens on file-sharing platforms.
67. How do cybercriminals use malvertising for malware distribution?
π A) By placing malicious ads on legitimate websites
π B) By hacking search engine ranking algorithms
π C) By replacing website banners with phishing links
π D) By encrypting ads to bypass ad-blockers
β
Answer: A) By placing malicious ads on legitimate websites
π Explanation: Malicious ads can redirect users to exploit kits or force malware downloads.
68. What makes polymorphic malware hard to detect?
π A) It constantly changes its code while keeping the same functionality
π B) It can only execute inside virtual machines
π C) It uses AI to target specific systems
π D) It encrypts itself every time it runs
β
Answer: A) It constantly changes its code while keeping the same functionality
π Explanation: Polymorphic malware modifies its signature, making it harder for traditional antivirus solutions to detect.
69. What is the role of exploit kits in malware delivery?
π A) They identify and exploit software vulnerabilities automatically
π B) They deliver patches to prevent malware
π C) They generate unique encryption keys for malware
π D) They are used only in ethical hacking
β
Answer: A) They identify and exploit software vulnerabilities automatically
π Explanation: Exploit kits automate the process of finding and exploiting unpatched software vulnerabilities.
70. What is rogue security software?
π A) Fake antivirus software that installs malware instead of removing it
π B) A legitimate tool that scans for vulnerabilities
π C) A penetration testing framework used by ethical hackers
π D) A form of ransomware
β
Answer: A) Fake antivirus software that installs malware instead of removing it
π Explanation: Rogue security software tricks users into downloading malware under the pretense of removing threats.
71. How do hackers use botnets for malware delivery?
π A) By distributing malware to multiple systems simultaneously
π B) By encrypting files before delivery
π C) By launching direct SQL Injection attacks
π D) By bypassing firewall security
β
Answer: A) By distributing malware to multiple systems simultaneously
π Explanation: Botnets distribute malware at scale, infecting multiple systems for further exploitation.
72. What is a key characteristic of a rootkit?
π A) It allows malware to remain undetected by modifying system files
π B) It spreads only through removable media
π C) It only affects mobile devices
π D) It cannot persist after a system restart
β
Answer: A) It allows malware to remain undetected by modifying system files
π Explanation: Rootkits hide malware by modifying system files and disabling security software.
73. How do hackers use phishing websites to distribute malware?
π A) By mimicking legitimate sites to trick users into downloading infected files
π B) By embedding malware directly into URLs
π C) By modifying browser certificates
π D) By creating fake search engine results
β
Answer: A) By mimicking legitimate sites to trick users into downloading infected files
π Explanation: Phishing websites are designed to look like real sites and prompt users to download malware or enter credentials.
74. What is a key characteristic of fileless malware?
π A) It operates in memory instead of writing files to disk
π B) It hides inside ZIP archives
π C) It infects only mobile devices
π D) It is immune to security patches
β
Answer: A) It operates in memory instead of writing files to disk
π Explanation: Fileless malware executes directly in RAM, making it difficult to detect and remove.
75. What is an example of malware propagation through removable media?
π A) Auto-run malware on infected USB drives
π B) Ransomware spreading through Bluetooth
π C) Malware executing via online banking applications
π D) Malware hidden in cloud storage links
β
Answer: A) Auto-run malware on infected USB drives
π Explanation: Some malware exploits USB autorun features to automatically execute when plugged into a computer.
76. What is a distinguishing feature of ransomware?
π A) It encrypts files and demands payment for decryption
π B) It steals banking credentials
π C) It spreads only through USB devices
π D) It primarily affects IoT devices
β
Answer: A) It encrypts files and demands payment for decryption
π Explanation: Ransomware locks access to files or systems and demands a ransom payment in cryptocurrency to restore access.
77. How do hackers spread malware through Discord and Telegram?
π A) By sending malicious files disguised as legitimate content
π B) By taking control of user accounts remotely
π C) By modifying Discordβs core application
π D) By intercepting messages using encryption flaws
β
Answer: A) By sending malicious files disguised as legitimate content
π Explanation: Attackers upload malware-laced files to messaging platforms like Discord and Telegram and trick users into downloading them.
78. What is the primary function of a keylogger in malware attacks?
π A) To secretly record keystrokes and steal sensitive information
π B) To inject malicious code into search engine results
π C) To encrypt files without user permission
π D) To create fake accounts on social media
β
Answer: A) To secretly record keystrokes and steal sensitive information
π Explanation: Keyloggers capture everything a user types, including passwords, credit card numbers, and personal messages.
79. How does a man-in-the-middle (MITM) attack help distribute malware?
π A) By intercepting and modifying network traffic to inject malicious payloads
π B) By forcing users to download fake PDF files
π C) By encrypting all outgoing web traffic
π D) By sending malware via Bluetooth beacons
β
Answer: A) By intercepting and modifying network traffic to inject malicious payloads
π Explanation: In a MITM attack, hackers can modify HTTP or DNS traffic to redirect victims to malware-infected websites.
80. How do attackers use fake browser updates to deliver malware?
π A) By displaying pop-ups that trick users into installing trojanized “update” files
π B) By modifying browser settings remotely
π C) By injecting malware directly into cookies
π D) By forcing browsers into “safe mode” before launching attacks
β
Answer: A) By displaying pop-ups that trick users into installing trojanized “update” files
π Explanation: Fake browser update messages prompt users to download malware disguised as a security update.
81. How do attackers use PDF exploits for malware delivery?
π A) By embedding malicious JavaScript in PDF documents
π B) By encrypting the PDF file with a ransomware payload
π C) By modifying the metadata of PDFs
π D) By using PDFs to initiate brute force attacks
β
Answer: A) By embedding malicious JavaScript in PDF documents
π Explanation: Some malicious PDFs contain JavaScript exploits that execute malware when opened.
82. How does email spoofing help in malware distribution?
π A) By making phishing emails appear as if they come from trusted sources
π B) By modifying the recipientβs email settings
π C) By blocking antivirus scans on attachments
π D) By encrypting email attachments before delivery
β
Answer: A) By making phishing emails appear as if they come from trusted sources
π Explanation: Email spoofing manipulates email headers to make phishing messages look like theyβre from a legitimate sender.
83. What is an example of malware spreading via DNS tunneling?
π A) Using DNS queries to send and receive malware commands
π B) Encrypting DNS requests to bypass firewalls
π C) Modifying browser DNS settings remotely
π D) Injecting JavaScript into DNS requests
β
Answer: A) Using DNS queries to send and receive malware commands
π Explanation: DNS tunneling allows attackers to bypass security controls and distribute malware via DNS traffic.
84. How does social engineering contribute to malware infections?
π A) By tricking users into installing malware voluntarily
π B) By modifying network security policies
π C) By launching brute-force attacks on passwords
π D) By altering encryption algorithms
β
Answer: A) By tricking users into installing malware voluntarily
π Explanation: Attackers manipulate human behavior to convince users to download and execute malware.
85. What is the role of a botnet in distributing malware?
π A) It acts as a network of infected devices to spread malware further
π B) It encrypts all files before spreading them
π C) It modifies firewall rules remotely
π D) It is used only for cryptocurrency mining
β
Answer: A) It acts as a network of infected devices to spread malware further
π Explanation: Botnets are used to distribute malware at scale, infecting thousands of devices simultaneously.
86. What is a common method of spreading malware through Bluetooth?
π A) Exploiting vulnerabilities in Bluetooth pairing protocols
π B) Encrypting Bluetooth signals with a malicious payload
π C) Overloading Bluetooth frequencies to disrupt communication
π D) Disguising malware as a Bluetooth audio file
β
Answer: A) Exploiting vulnerabilities in Bluetooth pairing protocols
π Explanation: Attackers exploit weak Bluetooth security settings to install malware on nearby devices.
87. How do attackers use SMS phishing (smishing) for malware distribution?
π A) By sending fake text messages containing malicious links
π B) By modifying cellular network encryption
π C) By executing direct SIM swap attacks
π D) By embedding malware into voice calls
β
Answer: A) By sending fake text messages containing malicious links
π Explanation: Smishing tricks users into clicking malicious links sent via SMS.
88. What is an example of malware hiding in cloud-based applications?
π A) Malicious macros in shared cloud documents
π B) Executable malware files disguised as PDFs
π C) Infected ZIP files uploaded to cloud storage
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers use cloud platforms to distribute infected macros, PDFs, and ZIP files.
89. How do cybercriminals distribute malware through fake job postings?
π A) By embedding malicious links in fake job applications
π B) By requiring victims to download an “application form” that contains malware
π C) By using phishing emails that appear to be from HR recruiters
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers use fake job postings to trick applicants into downloading malware.
90. How does malware exploit security misconfigurations in web applications?
π A) By injecting malicious scripts via input fields
π B) By bypassing authentication mechanisms
π C) By exploiting default credentials on admin panels
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers exploit misconfigured security settings to inject malware, bypass authentication, and escalate privileges.
91. How do attackers use compromised WordPress sites to distribute malware?
π A) By injecting malicious JavaScript into web pages
π B) By adding backdoors to plugins and themes
π C) By redirecting visitors to phishing sites
π D) All of the above
β
Answer: D) All of the above
π Explanation: Hackers compromise WordPress sites to inject malicious JavaScript, backdoors, and redirections, leading to malware infections.
92. What is the primary goal of malware hidden in browser extensions?
π A) To steal browser cookies and session data
π B) To bypass antivirus software
π C) To disable JavaScript execution
π D) To modify DNS records
β
Answer: A) To steal browser cookies and session data
π Explanation: Malicious browser extensions can steal user data, track browsing activity, and hijack login sessions.
93. How do attackers use fake CAPTCHA pages to distribute malware?
π A) By tricking users into enabling malicious browser notifications
π B) By running malware scripts when users click “Verify”
π C) By using hidden iframes to execute downloads
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake CAPTCHA pages use social engineering to make users click buttons that trigger malware downloads or unwanted browser permissions.
94. How can attackers distribute malware through compromised email accounts?
π A) By sending phishing emails with malicious attachments
π B) By embedding malware in email signatures
π C) By inserting malicious links into forwarded conversations
π D) All of the above
β
Answer: D) All of the above
π Explanation: Compromised email accounts allow attackers to spread malware through phishing emails, email signatures, and infected attachments.
95. What is a characteristic of “silent” malware infections?
π A) The malware runs in the background without user awareness
π B) The malware encrypts files but doesn’t demand a ransom
π C) The malware deletes itself after execution
π D) The malware displays fake security alerts
β
Answer: A) The malware runs in the background without user awareness
π Explanation: Silent malware infections operate stealthily, stealing data or controlling systems without detection.
96. How do attackers use fake invoice emails to spread malware?
π A) By attaching infected Excel or PDF files
π B) By embedding malicious links in email content
π C) By impersonating legitimate companies
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake invoice emails often contain malicious attachments, phishing links, and impersonate real businesses.
97. What is the primary risk of downloading pirated video games?
π A) The game might not work properly
π B) The game may contain hidden trojans or ransomware
π C) The download speed is usually slow
π D) The file format may not be compatible with the system
β
Answer: B) The game may contain hidden trojans or ransomware
π Explanation: Cracked and pirated games often include trojans, keyloggers, and ransomware, infecting systems when executed.
98. What is “USB Rubber Ducky” in malware attacks?
π A) A malicious USB device that executes pre-programmed scripts
π B) A virus that spreads through Bluetooth devices
π C) A tool used to detect infected USB drives
π D) A keylogger hidden inside a USB mouse
β
Answer: A) A malicious USB device that executes pre-programmed scripts
π Explanation: The USB Rubber Ducky mimics a keyboard and executes automated attack scripts when plugged into a system.
99. How does “malicious PDF embedding” work?
π A) By hiding JavaScript exploits inside PDF files
π B) By modifying PDF metadata to redirect users to malware sites
π C) By encrypting malware payloads inside PDFs
π D) By creating fake error messages that trigger malware execution
β
Answer: A) By hiding JavaScript exploits inside PDF files
π Explanation: Malicious PDFs contain embedded JavaScript exploits that execute malware when opened.
100. How do attackers distribute malware through online advertisements?
π A) By injecting malicious code into ad networks
π B) By displaying fake download buttons on websites
π C) By redirecting users to exploit kits
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malvertising spreads malware by infecting ad networks, tricking users with fake buttons, and using redirects to exploit kits.
101. What is an example of a firmware-based malware attack?
π A) BIOS rootkits that persist even after OS reinstallation
π B) Browser hijackers that modify search results
π C) Keyloggers hidden in software installers
π D) Malware hidden in MS Word macros
β
Answer: A) BIOS rootkits that persist even after OS reinstallation
π Explanation: Firmware-based malware infects BIOS/UEFI, making it difficult to detect and remove.
102. How does malware spread via QR code phishing?
π A) By redirecting users to malicious websites when scanned
π B) By executing malware through Bluetooth connections
π C) By modifying NFC settings on mobile devices
π D) By injecting JavaScript into mobile apps
β
Answer: A) By redirecting users to malicious websites when scanned
π Explanation: QR phishing (Quishing) directs victims to malware-infected websites when scanned.
103. How do attackers use “rogue proxies” to distribute malware?
π A) By hijacking network traffic and injecting malicious payloads
π B) By forcing victims to download fake certificates
π C) By creating VPN-like malware tunnels
π D) By blocking security software updates
β
Answer: A) By hijacking network traffic and injecting malicious payloads
π Explanation: Rogue proxies intercept network traffic and deliver malicious payloads to victims.
104. What is “payload obfuscation” in malware distribution?
π A) Hiding the malwareβs code to avoid detection
π B) Encrypting malware to prevent execution
π C) Disguising ransomware as legitimate files
π D) Injecting malware directly into browser cache
β
Answer: A) Hiding the malwareβs code to avoid detection
π Explanation: Obfuscation alters malware signatures, making it harder for antivirus software to detect threats.
105. How do attackers use “clickbait” tactics to distribute malware?
π A) By using misleading headlines to trick users into clicking infected links
π B) By embedding malware inside HTML buttons
π C) By injecting exploits into trending news pages
π D) By modifying browser cookies to execute malware
β
Answer: A) By using misleading headlines to trick users into clicking infected links
π Explanation: Clickbait malware tricks users into clicking malicious links by using sensational headlines.
106. How does malware spread through hacked smart home devices?
π A) By exploiting weak passwords and unpatched firmware vulnerabilities
π B) By sending phishing emails from smart TVs
π C) By executing ransomware inside home security cameras
π D) By modifying device encryption algorithms
β
Answer: A) By exploiting weak passwords and unpatched firmware vulnerabilities
π Explanation: Attackers target poorly secured IoT devices (e.g., routers, security cameras, smart speakers) to install malware or create botnets.
107. How does “search engine poisoning” lead to malware infections?
π A) By manipulating search engine rankings to push malicious websites
π B) By injecting malware into search bar queries
π C) By using hidden browser bookmarks
π D) By modifying browser homepages remotely
β
Answer: A) By manipulating search engine rankings to push malicious websites
π Explanation: Search engine poisoning ranks malware-hosting sites higher in search results, tricking users into clicking them.
108. How does “rogue mobile banking malware” operate?
π A) By intercepting SMS-based two-factor authentication (2FA) codes
π B) By forcing users to factory reset their devices
π C) By modifying encrypted financial transactions
π D) By disabling all banking apps on a device
β
Answer: A) By intercepting SMS-based two-factor authentication (2FA) codes
π Explanation: Rogue banking malware steals 2FA codes to bypass security protections and hijack accounts.
109. How does “voice phishing (vishing)” assist in malware delivery?
π A) By tricking victims into downloading malware over a phone call
π B) By injecting malware into VoIP calls
π C) By using speech-to-text malware delivery
π D) By modifying call encryption algorithms
β
Answer: A) By tricking victims into downloading malware over a phone call
π Explanation: Vishing (voice phishing) attackers impersonate tech support or banks, convincing victims to install malware.
110. How do attackers use “browser exploits” to spread malware?
π A) By exploiting unpatched browser vulnerabilities to execute malicious code
π B) By modifying search bar queries to inject payloads
π C) By forcing users to install browser extensions
π D) By redirecting users to social engineering websites
β
Answer: A) By exploiting unpatched browser vulnerabilities to execute malicious code
π Explanation: Browser exploits target security flaws in browsers (e.g., Chrome, Firefox, Edge) to run malware automatically.
111. What is the role of WebSockets in malware distribution?
π A) They enable real-time communication that can be hijacked for malware delivery
π B) They allow attackers to send phishing emails in bulk
π C) They provide a secure way to prevent malware infections
π D) They are only used in banking applications
β
Answer: A) They enable real-time communication that can be hijacked for malware delivery
π Explanation: WebSocket attacks can allow malware to bypass traditional security filters and deliver real-time payloads.
112. How do attackers use fake online surveys to distribute malware?
π A) By tricking users into downloading “survey completion rewards” that contain malware
π B) By modifying survey responses to inject malware
π C) By using surveys to encrypt data remotely
π D) By hijacking survey results to steal passwords
β
Answer: A) By tricking users into downloading “survey completion rewards” that contain malware
π Explanation: Fake surveys promise free rewards, but users must download infected files to claim them.
113. How does “geo-targeted malware” work?
π A) By detecting a user’s location and customizing attacks accordingly
π B) By spreading malware through GPS signals
π C) By infecting only government networks
π D) By modifying Google Maps routes
β
Answer: A) By detecting a user’s location and customizing attacks accordingly
π Explanation: Geo-targeted malware adjusts its behavior based on the victim’s location to evade security detection.
114. How do cybercriminals distribute malware via pirated eBooks?
π A) By embedding malicious scripts inside PDF or EPUB files
π B) By distributing books through AI-generated content
π C) By modifying the text in eBooks
π D) By hiding malware inside book covers
β
Answer: A) By embedding malicious scripts inside PDF or EPUB files
π Explanation: Malicious eBooks contain hidden scripts that execute malware when opened.
115. How does “zero-click malware” infect a device?
π A) By exploiting vulnerabilities without user interaction
π B) By sending malicious push notifications
π C) By requiring users to install software updates
π D) By injecting malware into smartwatches
β
Answer: A) By exploiting vulnerabilities without user interaction
π Explanation: Zero-click malware installs itself by exploiting system vulnerabilities, requiring no user action.
116. How do cybercriminals use AI-generated voices in malware distribution?
π A) By impersonating real people in vishing scams
π B) By encrypting voice messages with ransomware
π C) By modifying VoIP signals for malware injection
π D) By hijacking voice recognition systems
β
Answer: A) By impersonating real people in vishing scams
π Explanation: AI voice generators create deepfake audio, tricking victims into downloading malware.
117. How does malware spread through video streaming platforms?
π A) By embedding malicious links in video descriptions
π B) By modifying video resolution settings
π C) By forcing users to download plugins before watching
π D) By altering the playback speed to trigger malware
β
Answer: A) By embedding malicious links in video descriptions
π Explanation: Attackers use YouTube and other platforms to link users to infected downloads.
118. How do attackers use LinkedIn to distribute malware?
π A) By sending fake job offers with infected attachments
π B) By hijacking professional accounts for malware spreading
π C) By embedding malware in direct messages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers exploit LinkedIn to distribute malware via fake job offers, compromised accounts, and phishing links.
119. How does malware spread through QR code-based restaurant menus?
π A) By redirecting users to malware-infected websites
π B) By modifying restaurant Wi-Fi settings
π C) By hijacking payment transactions
π D) By encrypting QR code data
β
Answer: A) By redirecting users to malware-infected websites
π Explanation: Malicious QR codes direct customers to infected phishing sites when scanned.
120. How does malware use AI-generated content to bypass detection?
π A) By using machine learning to rewrite malware payloads
π B) By generating fake online reviews with embedded malware
π C) By modifying code signatures dynamically
π D) All of the above
β
Answer: D) All of the above
π Explanation: AI-powered malware adapts by rewriting its code, faking legitimacy, and avoiding detection.
121. How do cybercriminals use deepfake videos to spread malware?
π A) By embedding malicious links in video descriptions
π B) By impersonating trusted individuals to trick victims into downloading malware
π C) By encrypting malware payloads inside video files
π D) By modifying social media video settings
β
Answer: B) By impersonating trusted individuals to trick victims into downloading malware
π Explanation: Deepfake technology allows attackers to create fake video messages from executives or celebrities, convincing victims to download infected files.
122. How does “Wi-Fi honeypot malware” work?
π A) By setting up fake Wi-Fi networks to intercept traffic and inject malware
π B) By encrypting Wi-Fi connections to prevent malware detection
π C) By hiding malware in Wi-Fi passwords
π D) By modifying router firmware remotely
β
Answer: A) By setting up fake Wi-Fi networks to intercept traffic and inject malware
π Explanation: Attackers create rogue Wi-Fi networks to steal login credentials and inject malware into HTTP traffic.
123. How do attackers use fake customer service chatbots to distribute malware?
π A) By sending phishing links disguised as support responses
π B) By hijacking customer support conversations
π C) By forcing users to download “support software” that contains malware
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake customer support chatbots can phish users, hijack conversations, and push malware-laced downloads.
124. How does “HTML smuggling” deliver malware?
π A) By embedding malicious JavaScript inside HTML files
π B) By exploiting HTTP headers to force malware execution
π C) By modifying website source code to inject malware
π D) By using browser cookies to bypass security
β
Answer: A) By embedding malicious JavaScript inside HTML files
π Explanation: HTML smuggling hides malware inside HTML or JavaScript, triggering execution when opened in a browser.
125. How do attackers use cryptocurrency giveaway scams to deliver malware?
π A) By tricking users into downloading fake crypto wallets that contain malware
π B) By embedding malware inside cryptocurrency transactions
π C) By using blockchain technology to spread malware
π D) By modifying crypto exchange rates
β
Answer: A) By tricking users into downloading fake crypto wallets that contain malware
π Explanation: Fake crypto giveaways often ask victims to download “wallet software” that contains malware or backdoors.
126. How does malware spread through smartwatches and fitness trackers?
π A) By exploiting Bluetooth vulnerabilities to spread malware to connected devices
π B) By modifying step-count data to deliver malware
π C) By hiding malware inside fitness tracking apps
π D) By using GPS data to distribute malicious payloads
β
Answer: A) By exploiting Bluetooth vulnerabilities to spread malware to connected devices
π Explanation: Malware can jump from smartwatches to smartphones by exploiting insecure Bluetooth connections.
127. What is the main way “fileless malware” spreads?
π A) By exploiting in-memory execution without leaving files on disk
π B) By modifying antivirus databases
π C) By injecting malware into the recycle bin
π D) By encrypting registry keys
β
Answer: A) By exploiting in-memory execution without leaving files on disk
π Explanation: Fileless malware operates entirely in memory, making it harder to detect using traditional antivirus tools.
128. How does “living off the land” malware operate?
π A) By abusing legitimate system tools (e.g., PowerShell) to execute malicious actions
π B) By modifying environmental variables to hide payloads
π C) By injecting malware inside system registry keys
π D) By using cloud storage as an attack vector
β
Answer: A) By abusing legitimate system tools (e.g., PowerShell) to execute malicious actions
π Explanation: Living off the land (LotL) attacks use built-in tools like PowerShell and WMI to execute malware without dropping files.
129. How do attackers use compromised GitHub repositories to distribute malware?
π A) By uploading infected code disguised as open-source projects
π B) By modifying README files to redirect users to malicious sites
π C) By injecting malware into pull requests
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers upload trojanized repositories, modify documentation, and push malicious commits to spread malware.
130. What is “homoglyph phishing” in malware distribution?
π A) Using visually similar domain names to trick users into downloading malware
π B) Encrypting malware in Unicode characters
π C) Injecting malware into font files
π D) Using special symbols to bypass email filters
β
Answer: A) Using visually similar domain names to trick users into downloading malware
π Explanation: Attackers register lookalike domain names (e.g., “g00gle.com”) to trick users into downloading malware.
131. How does “DLL sideloading” help malware evade detection?
π A) By placing malicious DLL files where trusted programs load them
π B) By encrypting DLL files before execution
π C) By modifying system startup scripts
π D) By injecting malware into web browsers
β
Answer: A) By placing malicious DLL files where trusted programs load them
π Explanation: DLL sideloading tricks legitimate applications into loading and executing malicious DLL files.
132. How do hackers spread malware using free VPN services?
π A) By injecting ads that lead to malware-infected sites
π B) By modifying VPN traffic to distribute malicious payloads
π C) By stealing user data and selling it on the dark web
π D) All of the above
β
Answer: D) All of the above
π Explanation: Some free VPNs inject malicious ads, steal data, and even deliver malware.
133. How do attackers use “clipboard hijacking” to steal cryptocurrency?
π A) By replacing copied wallet addresses with attacker-controlled addresses
π B) By modifying cryptocurrency exchange rates
π C) By injecting JavaScript into trading platforms
π D) By monitoring Wi-Fi networks for crypto transactions
β
Answer: A) By replacing copied wallet addresses with attacker-controlled addresses
π Explanation: Clipboard hijackers detect crypto wallet addresses and swap them with attacker-controlled addresses.
134. How does malware spread through fake AI-powered tools?
π A) By tricking users into installing AI-generated “enhancement” software
π B) By modifying neural network algorithms
π C) By injecting malware into AI-generated images
π D) By using AI-powered chatbots to force downloads
β
Answer: A) By tricking users into installing AI-generated “enhancement” software
π Explanation: Attackers disguise malware as AI-powered productivity tools, tricking users into downloading them.
135. How does malware use “invisible iframe injections” to infect users?
π A) By embedding hidden iframes that load malicious content in the background
π B) By displaying fake alerts that trick users into clicking them
π C) By modifying the user’s firewall settings
π D) By embedding malware inside web cookies
β
Answer: A) By embedding hidden iframes that load malicious content in the background
π Explanation: Invisible iframes silently load malware-hosting websites, infecting users without any interaction.
136. What is the main goal of “ransomcloud” attacks?
π A) To encrypt files stored in cloud services and demand ransom
π B) To steal cloud-based API keys
π C) To hijack cloud admin accounts for botnet operations
π D) To disable two-factor authentication on cloud services
β
Answer: A) To encrypt files stored in cloud services and demand ransom
π Explanation: Ransomcloud attacks encrypt files in OneDrive, Google Drive, and other cloud storage platforms, demanding ransom payments.
137. How does malware hide inside online code repositories?
π A) By embedding malicious scripts in open-source projects
π B) By modifying commit histories to inject malicious code
π C) By distributing infected dependency packages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers use infected repositories, poisoned dependencies, and modified commit logs to distribute malware through GitHub and open-source projects.
138. How do attackers use “fake resume emails” to spread malware?
π A) By attaching infected Word documents with macro-based malware
π B) By sending phishing links to fake job applications
π C) By exploiting recruitment platforms to host malware
π D) By injecting malware inside email headers
β
Answer: A) By attaching infected Word documents with macro-based malware
π Explanation: Fake job resumes often contain malicious macros that execute malware when the document is opened.
139. What is the purpose of a “browser-in-the-browser” phishing attack?
π A) To create fake login pop-ups that steal credentials
π B) To execute ransomware through JavaScript
π C) To hijack the browser’s update mechanism
π D) To disable browser security plugins
β
Answer: A) To create fake login pop-ups that steal credentials
π Explanation: Browser-in-the-browser (BitB) phishing tricks users into entering credentials into a fake login window inside a website.
140. How does malware spread via “malicious Chrome extensions”?
π A) By injecting malicious scripts into web pages
π B) By logging keystrokes from web forms
π C) By redirecting searches to malicious websites
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious Chrome extensions can inject scripts, log keystrokes, and redirect searches to malware-infected pages.
141. How does “typosquatting” help attackers distribute malware?
π A) By registering misspelled domain names of popular websites to trick users
π B) By injecting typos into software code to trigger exploits
π C) By modifying search results to promote malware-infected sites
π D) By creating fake file names that look like legitimate ones
β
Answer: A) By registering misspelled domain names of popular websites to trick users
π Explanation: Typosquatting involves registering similar-looking domains (e.g., “facbook.com”) to distribute malware.
142. How do attackers use “malicious website pop-ups” to spread malware?
π A) By displaying fake security warnings that trick users into downloading malware
π B) By using JavaScript to force auto-downloads
π C) By embedding exploit kits inside pop-up windows
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious pop-ups display fake alerts, trigger auto-downloads, and inject exploits into browsers.
143. How do attackers spread malware using USB charging stations (Juice Jacking)?
π A) By installing malware onto a device when it is plugged into a compromised charging station
π B) By modifying USB ports to send malicious commands
π C) By infecting only Apple devices through USB-C connections
π D) By encrypting device storage through the charging port
β
Answer: A) By installing malware onto a device when it is plugged into a compromised charging station
π Explanation: Juice jacking infects devices when they are plugged into compromised public USB charging stations.
144. How does “rogue AI chatbots” help in malware delivery?
π A) By sending malicious links disguised as helpful responses
π B) By exploiting AI-driven voice assistants to download malware
π C) By using machine learning to spread malware faster
π D) By encrypting chatbot messages with hidden payloads
β
Answer: A) By sending malicious links disguised as helpful responses
π Explanation: Malicious AI chatbots provide infected links disguised as legitimate advice.
145. How do attackers use “malicious torrent files” to spread malware?
π A) By embedding malware in pirated software and movies
π B) By modifying torrent tracker metadata
π C) By injecting exploits into video subtitles
π D) By distributing fake seeders with malware payloads
β
Answer: A) By embedding malware in pirated software and movies
π Explanation: Many torrent files contain infected keygens, trojans, or ransomware hidden inside pirated content.
146. What is the role of “rogue browser updates” in malware infections?
π A) They trick users into downloading fake updates containing malware
π B) They modify the browserβs security settings remotely
π C) They inject malware into cache files
π D) They automatically redirect users to exploit kits
β
Answer: A) They trick users into downloading fake updates containing malware
π Explanation: Fake browser update alerts convince users to download malware disguised as security updates.
147. How do attackers use “malicious NFT airdrops” to distribute malware?
π A) By sending NFT links that install wallet-stealing malware
π B) By encrypting NFT metadata with ransomware
π C) By using NFTs to trigger cryptocurrency mining scripts
π D) By injecting malware into NFT blockchain transactions
β
Answer: A) By sending NFT links that install wallet-stealing malware
π Explanation: Malicious NFT airdrops lure victims into downloading infected wallet apps.
148. What is “watering hole malware” in cyberattacks?
π A) Malware that targets websites frequently visited by a specific group
π B) Malware that spreads through watermarked images
π C) Malware that modifies DNS records in public Wi-Fi
π D) Malware that infects data stored in cloud backups
β
Answer: A) Malware that targets websites frequently visited by a specific group
π Explanation: Watering hole attacks infect trusted websites, targeting specific organizations or industries.
149. How do attackers use “malicious mobile app permissions” to install malware?
π A) By requesting excessive permissions to access sensitive data
π B) By modifying app settings in the background
π C) By changing security policies remotely
π D) By forcing users to enable administrative rights
β
Answer: A) By requesting excessive permissions to access sensitive data
π Explanation: Malicious apps request unnecessary permissions (e.g., SMS access, camera control) to steal data or install malware.
150. How does malware use “exploit chains” to gain access to a system?
π A) By combining multiple vulnerabilities to bypass security defenses
π B) By using brute force attacks to crack system passwords
π C) By modifying file attributes to evade detection
π D) By exploiting cloud services to inject malware
β
Answer: A) By combining multiple vulnerabilities to bypass security defenses
π Explanation: Exploit chains involve using multiple linked vulnerabilities to escalate privileges and bypass security.
151. How do attackers distribute malware through software supply chain attacks?
π A) By injecting malicious code into software updates or dependencies
π B) By exploiting hardware vulnerabilities in supply chains
π C) By distributing malware through counterfeit software packages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Supply chain attacks inject malware into legitimate software updates, hardware, and dependencies.
152. What is the primary risk of downloading cracked or pirated software?
π A) It often contains embedded malware such as trojans or keyloggers
π B) It consumes more storage space than official software
π C) It slows down internet speed significantly
π D) It prevents access to official documentation
β
Answer: A) It often contains embedded malware such as trojans or keyloggers
π Explanation: Cracked software is a common method of malware delivery, often containing ransomware, trojans, and spyware.
153. How does malware spread through online quizzes and personality tests?
π A) By harvesting personal data to craft targeted phishing attacks
π B) By embedding malicious JavaScript in quiz results pages
π C) By forcing users to install browser extensions for quiz completion
π D) All of the above
β
Answer: D) All of the above
π Explanation: Online quizzes are used to collect personal data, deliver malicious scripts, and spread malware.
154. How do cybercriminals use “malicious macros” in Microsoft Office documents?
π A) By embedding VBA scripts that execute malware when the document is opened
π B) By modifying Office settings to disable security alerts
π C) By forcing users to enable developer mode
π D) By encrypting the document header to bypass detection
β
Answer: A) By embedding VBA scripts that execute malware when the document is opened
π Explanation: Malicious macros in Word, Excel, and PowerPoint files execute malware when macros are enabled.
155. How does malware spread through malicious browser cookies?
π A) By storing session hijacking scripts inside cookies
π B) By modifying browser cache settings
π C) By injecting payloads into HTTP headers
π D) By encrypting cookie data with a malware key
β
Answer: A) By storing session hijacking scripts inside cookies
π Explanation: Malicious cookies can contain session hijacking scripts that steal authentication tokens.
156. What is a key method of malware delivery using “fake browser plugins”?
π A) By injecting malicious JavaScript into web pages
π B) By redirecting users to phishing websites
π C) By logging keystrokes and stealing credentials
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake browser extensions can steal credentials, inject scripts, and hijack browser sessions.
157. How does malware propagate through fake CAPTCHA verification pages?
π A) By making users unknowingly approve malicious browser notifications
π B) By logging keystrokes when users enter the CAPTCHA
π C) By injecting malware into encrypted CAPTCHA responses
π D) By redirecting users to harmless sites while malware runs in the background
β
Answer: A) By making users unknowingly approve malicious browser notifications
π Explanation: Fake CAPTCHA pop-ups trick users into allowing malware-laced browser notifications.
158. How do attackers distribute malware via “fake refund scam emails”?
π A) By tricking victims into opening malicious attachments
π B) By embedding malware inside fake payment links
π C) By redirecting users to credential-stealing pages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake refund emails use attachments, links, and phishing pages to distribute malware.
159. How does malware spread via fake Adobe Flash Player updates?
π A) By tricking users into downloading trojanized update files
π B) By modifying legitimate Flash Player settings
π C) By embedding exploits in official Flash files
π D) By targeting browser compatibility settings
β
Answer: A) By tricking users into downloading trojanized update files
π Explanation: Fake Flash Player updates are a common way to spread malware disguised as software updates.
160. How does malware use “voice assistant hijacking” to spread?
π A) By injecting commands into voice-controlled devices
π B) By modifying audio settings to force malware execution
π C) By using ultrasonic sound waves to trigger malware scripts
π D) By creating fake AI-generated voice commands
β
Answer: C) By using ultrasonic sound waves to trigger malware scripts
π Explanation: Attackers exploit ultrasonic commands to control voice assistants remotely and trigger malware execution.
161. How does malware propagate through “malicious PDF watermarks”?
π A) By embedding hidden scripts in the watermark layer of the document
π B) By modifying PDF permissions to allow automatic execution
π C) By encrypting hidden commands within metadata fields
π D) By replacing text with malware-encoded characters
β
Answer: A) By embedding hidden scripts in the watermark layer of the document
π Explanation: Malicious PDFs can contain exploitable scripts hidden within watermark layers.
162. How does malware spread using “rogue mobile security apps”?
π A) By posing as antivirus apps that secretly install malware
π B) By disabling built-in security features on smartphones
π C) By modifying app permissions to gain full access
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake security apps often disable real security, modify permissions, and install malware.
163. How do cybercriminals use Google Forms for malware delivery?
π A) By tricking users into entering sensitive data on fake forms
π B) By embedding malicious scripts in form responses
π C) By hiding malware links in the form submission confirmation page
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers embed malicious scripts, phishing links, and malware downloads inside Google Forms.
164. How do attackers use “malicious Windows shortcut files (.LNK)” to deliver malware?
π A) By embedding commands that execute hidden payloads
π B) By modifying Windows registry startup settings
π C) By disguising as legitimate shortcuts to system tools
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious .LNK files execute hidden commands, modify registry settings, and disguise themselves as legitimate files.
165. What is “clickless malware” and how does it spread?
π A) Malware that infects devices without requiring any user interaction
π B) Malware that spreads by clicking links in phishing emails
π C) Malware that modifies Windows event logs
π D) Malware that requires admin privileges to install
β
Answer: A) Malware that infects devices without requiring any user interaction
π Explanation: Clickless malware exploits vulnerabilities to infect systems without any clicks or downloads.
166. How do cybercriminals distribute malware using fake job application portals?
π A) By embedding malware in downloadable “resume templates”
π B) By redirecting users to phishing login pages
π C) By forcing users to install a “job application plugin”
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake job portals trick users into downloading malware-infected templates, phishing login credentials, and installing malicious plugins.
167. How does malware spread through malicious PowerPoint presentations?
π A) By executing embedded VBA macros upon opening
π B) By hiding malicious payloads in slide transitions
π C) By using PowerPoint Object Linking and Embedding (OLE) to execute scripts
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers use VBA macros, OLE objects, and transition triggers to execute malware inside PowerPoint presentations.
168. What is a common way attackers use “rogue QR codes” to distribute malware?
π A) By linking users to malicious sites that auto-download malware
π B) By encoding malware scripts directly inside the QR code
π C) By modifying legitimate QR codes on advertisements
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious QR codes redirect users to infected sites, inject scripts, or replace real QR codes in public places.
169. How do attackers spread malware via “rogue online courses”?
π A) By embedding malware in downloadable study materials
π B) By sending phishing emails with fake enrollment links
π C) By hosting fake learning portals that steal credentials
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake online courses distribute malware through infected PDFs, phishing links, and credential-stealing portals.
170. How do hackers use “fake speed test websites” to deliver malware?
π A) By embedding malware scripts inside speed test results
π B) By forcing users to download “speed booster” applications
π C) By redirecting users to exploit kits
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake internet speed test websites inject malware scripts, force downloads, or exploit browser vulnerabilities.
171. What is a major risk of downloading “modded” (modified) mobile apps?
π A) They often contain trojans or spyware
π B) They run faster than original apps
π C) They automatically uninstall after use
π D) They only work on rooted devices
β
Answer: A) They often contain trojans or spyware
π Explanation: Modded apps are unofficial versions of legitimate apps, often injected with spyware, adware, or trojans.
172. How do cybercriminals use “malicious AI-generated images” for malware delivery?
π A) By embedding malware payloads inside the metadata of AI-generated images
π B) By using AI to generate deepfake scam campaigns
π C) By using steganography to hide malware in the image pixels
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers use AI-generated images with hidden payloads, deepfake scams, and steganography-based malware delivery.
173. How does “rogue MFA (Multi-Factor Authentication) apps” spread malware?
π A) By mimicking real MFA apps but secretly stealing login credentials
π B) By injecting malicious scripts into real authentication processes
π C) By disabling real MFA settings on user accounts
π D) By forcing biometric verification before malware execution
β
Answer: A) By mimicking real MFA apps but secretly stealing login credentials
π Explanation: Fake MFA apps trick users into entering credentials, then send login information to attackers.
174. How does malware use “document templates” to infect victims?
π A) By embedding malicious macros inside official-looking templates
π B) By modifying metadata to trigger script execution
π C) By automatically executing payloads when the template is opened
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malware-infected document templates contain hidden macros, metadata exploits, and auto-executing scripts.
175. How does malware propagate through “cloud storage syncing”?
π A) By infecting one file that syncs across multiple devices
π B) By hiding malware inside shared folders
π C) By modifying cloud permissions to allow automatic execution
π D) All of the above
β
Answer: D) All of the above
π Explanation: Cloud malware spreads by syncing infected files, hiding in shared folders, and exploiting misconfigured permissions.
176. How do attackers distribute malware through fake “security alert emails”?
π A) By tricking users into clicking phishing links
π B) By embedding malware in fake “urgent update” attachments
π C) By redirecting users to credential-stealing login pages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers send fake security alerts with malicious links, infected attachments, and fake login pages.
177. How do cybercriminals spread malware through “fake resume-building websites”?
π A) By forcing users to download “resume templates” that contain malware
π B) By requiring users to enter credentials for “free downloads”
π C) By injecting JavaScript exploits into the website itself
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake resume-building websites spread malware via infected downloads, credential theft, and site exploits.
178. How do cybercriminals spread malware through “fake online giveaways”?
π A) By requiring victims to download “entry verification” files
π B) By embedding malware in confirmation emails
π C) By injecting malicious tracking cookies
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake giveaways are used to trick users into downloading malware or stealing personal data.
179. How do attackers distribute malware through “fake VPN services”?
π A) By offering free VPNs that secretly log user data and install malware
π B) By modifying network traffic to inject exploits
π C) By encrypting malicious payloads inside VPN tunnels
π D) All of the above
β
Answer: D) All of the above
π Explanation: Many fake VPN services log user data, modify traffic, and deliver stealth malware infections.
180. How does malware spread using “fake Windows activation tools”?
π A) By tricking users into downloading keygens that contain trojans
π B) By modifying system registry keys to allow backdoor access
π C) By installing hidden remote access trojans (RATs)
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake Windows activators often contain RATs, trojans, and registry modifications to maintain persistence.
181. How do cybercriminals use “rogue software cracks” to distribute malware?
π A) By embedding trojans inside keygens and patchers
π B) By modifying system files to allow persistent malware execution
π C) By tricking users into disabling antivirus software before installation
π D) All of the above
β
Answer: D) All of the above
π Explanation: Many pirated software cracks contain trojans, keyloggers, or remote access malware, often requiring users to disable security software.
182. How do hackers use “malicious Spotify playlists” to spread malware?
π A) By embedding malware-laced links in playlist descriptions
π B) By forcing users to download a “high-quality audio codec”
π C) By using fake Spotify accounts to send phishing messages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers distribute malware through fake playlist descriptions, phishing links, and fraudulent “audio enhancement” downloads.
183. How does malware spread through “malicious Instagram ads”?
π A) By redirecting users to malware-infected sites through fake promotions
π B) By injecting spyware into influencer-sponsored content
π C) By tricking users into downloading fake “exclusive content” files
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious Instagram ads promote fake giveaways, trojanized downloads, and phishing pages.
184. How do attackers use “voice cloning” to assist in malware distribution?
π A) By impersonating trusted individuals to convince victims to install malware
π B) By modifying VoIP signals to inject malicious commands
π C) By embedding malware in voice message files
π D) By using AI-generated voices to bypass biometric authentication
β
Answer: A) By impersonating trusted individuals to convince victims to install malware
π Explanation: AI-powered voice cloning allows cybercriminals to impersonate trusted figures and trick victims into installing malware.
185. How do cybercriminals spread malware through “malicious discount coupon sites”?
π A) By redirecting users to exploit kits after clicking fake discount links
π B) By requiring users to install a browser extension for discounts
π C) By embedding trojans in downloadable “coupon generator” tools
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers create fake discount sites and coupon tools that steal credentials, inject malware, or force unwanted installations.
186. How do hackers use “malicious LinkedIn job offers” to distribute malware?
π A) By sending phishing links disguised as job application portals
π B) By attaching infected PDFs or Word documents as job descriptions
π C) By embedding malware in LinkedIn direct messages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake LinkedIn job offers are used to spread phishing links, deliver malware via attachments, and steal credentials.
187. How do attackers distribute malware through “fake online tax filing services”?
π A) By requiring users to download a “tax calculator” that contains malware
π B) By stealing personal and financial information through fake tax websites
π C) By embedding spyware in tax refund phishing emails
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake tax filing services trick users into downloading malware, submitting personal data, and executing spyware scripts.
188. How do attackers use “malicious mobile themes” to spread malware?
π A) By embedding trojans in downloadable phone themes and icon packs
π B) By modifying system settings to allow malware persistence
π C) By using dynamic wallpaper engines to inject malicious scripts
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious mobile themes can install spyware, alter system settings, and execute trojanized scripts.
189. How does malware spread through “fake browser-based games”?
π A) By tricking users into installing a “game launcher” that contains malware
π B) By embedding malicious JavaScript inside the gameβs source code
π C) By using fake in-game rewards that require malicious app downloads
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake browser games are used to inject malware via game launchers, scripts, and trojanized app downloads.
190. How do cybercriminals use “fake online banking alerts” to distribute malware?
π A) By sending phishing emails with malicious login links
π B) By embedding trojans in fake “urgent security update” apps
π C) By tricking users into downloading “banking verification tools”
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake banking alerts use phishing emails, trojanized updates, and malicious downloads to infect victims.
191. How do attackers spread malware using “pirated digital design software”?
π A) By injecting trojans inside cracked versions of Photoshop and Illustrator
π B) By embedding keyloggers in downloadable design templates
π C) By tricking users into disabling antivirus software before installation
π D) All of the above
β
Answer: D) All of the above
π Explanation: Many pirated design software versions contain hidden trojans, keyloggers, and remote access malware.
192. How does malware spread through “malicious 3D printing files”?
π A) By embedding malware payloads inside .STL and .OBJ files
π B) By modifying G-code instructions to execute malicious scripts
π C) By tricking users into downloading fake “3D model optimizers”
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious 3D files can execute scripts, modify printer behavior, and spread malware.
193. How do cybercriminals distribute malware through “fake AI chatbots”?
π A) By embedding malicious links in chatbot-generated responses
π B) By forcing users to install AI-powered browser extensions
π C) By hijacking chatbot sessions to inject phishing messages
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious AI chatbots spread malware via infected links, trojanized browser extensions, and session hijacking.
194. How do attackers use “malicious Wi-Fi SSIDs” for malware distribution?
π A) By tricking users into connecting to rogue Wi-Fi networks that inject malware
π B) By embedding exploits into SSID names that execute on vulnerable devices
π C) By using Wi-Fi packet sniffing to modify legitimate software downloads
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious Wi-Fi networks exploit SSID-based vulnerabilities, intercept downloads, and inject malware.
195. How does malware spread through “fake crowdfunding campaigns”?
π A) By tricking donors into downloading trojanized receipt files
π B) By embedding malware in campaign updates and emails
π C) By using fake charities to collect sensitive financial data
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake crowdfunding scams distribute malware via infected receipts, phishing emails, and fraudulent donation pages.
196. How do attackers use “malicious browser push notifications” to distribute malware?
π A) By tricking users into enabling notifications that lead to phishing or malware sites
π B) By injecting malicious scripts into browser pop-ups
π C) By modifying browser permissions remotely
π D) By forcing users to install browser extensions
β
Answer: A) By tricking users into enabling notifications that lead to phishing or malware sites
π Explanation: Fake browser notifications appear as system alerts and redirect users to malware-infected websites.
197. How does malware spread through “malicious cloud-based collaboration tools”?
π A) By embedding malware in shared documents and spreadsheets
π B) By exploiting misconfigured file-sharing permissions
π C) By injecting malicious macros into cloud-synced files
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers target Google Drive, Dropbox, and Microsoft OneDrive by embedding malicious scripts, macros, and sharing exploits.
198. How do attackers use “malicious GitHub repositories” to spread malware?
π A) By uploading infected code disguised as open-source projects
π B) By injecting malicious scripts into dependencies
π C) By modifying README files to contain phishing links
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious GitHub repositories contain infected open-source code, compromised dependencies, and misleading documentation.
199. How does malware spread through “fake voice messaging apps”?
π A) By embedding spyware in the app that records private conversations
π B) By requiring excessive app permissions to access SMS and contacts
π C) By sending fake voice messages that contain malicious payloads
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious voice messaging apps steal user data, record conversations, and send fake voice messages with malware.
200. How do attackers distribute malware using “fake cryptocurrency wallets”?
π A) By offering trojanized wallet apps that steal private keys
π B) By redirecting transactions to attacker-controlled addresses
π C) By embedding spyware that tracks user activity
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake crypto wallets steal wallet credentials, hijack transactions, and spy on user activity.
201. How does malware spread through “compromised browser bookmarks”?
π A) By modifying stored bookmarks to redirect users to phishing sites
π B) By injecting malicious scripts when bookmarked pages are opened
π C) By using cloud-synced bookmarks to infect multiple devices
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malware can alter browser bookmarks to redirect users, inject scripts, and sync malicious links across devices.
202. How do attackers spread malware through “malicious MP3 or MP4 files”?
π A) By embedding malware inside media file metadata
π B) By exploiting vulnerabilities in media players to execute code
π C) By hiding malicious payloads inside subtitle files
π D) All of the above
β
Answer: D) All of the above
π Explanation: Attackers embed malware in media files, exploit player vulnerabilities, and use infected subtitle files to execute code.
203. How do cybercriminals use “malicious LinkedIn learning courses” to distribute malware?
π A) By embedding malware in course material downloads
π B) By redirecting users to phishing login pages
π C) By injecting scripts into fake educational platforms
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake LinkedIn learning courses trick users into downloading malware, entering credentials, or visiting infected sites.
204. How does malware spread through “fake mobile system updates”?
π A) By tricking users into downloading malware disguised as an OS update
π B) By modifying system files to allow persistent backdoors
π C) By disabling security features before malware execution
π D) All of the above
β
Answer: D) All of the above
π Explanation: Fake system updates convince users to install trojanized firmware, disable security, and allow backdoor access.
205. How do attackers use “malicious Steam Workshop mods” to distribute malware?
π A) By embedding malware inside game modification files
π B) By tricking users into installing fake “enhanced graphics packs”
π C) By injecting exploits into game scripts
π D) All of the above
β
Answer: D) All of the above
π Explanation: Malicious game mods distribute trojans, keyloggers, and remote execution exploits via Steam Workshop.