1. Which of the following is the most common method for delivering malware?

πŸ”˜ A) Sending a malicious USB drive via mail
πŸ”˜ B) Phishing emails with malicious attachments
πŸ”˜ C) Posting malware on social media
πŸ”˜ D) Printing QR codes on physical flyers

βœ… Answer: B) Phishing emails with malicious attachments
πŸ“ Explanation: Phishing emails are the most widely used method to deliver malware, often containing malicious links or attachments that trick users into executing harmful code.


2. What is a common characteristic of drive-by downloads?

πŸ”˜ A) They require explicit user permission before execution
πŸ”˜ B) They exploit vulnerabilities in browsers and plugins
πŸ”˜ C) They are only delivered via email
πŸ”˜ D) They require users to click on a pop-up warning

βœ… Answer: B) They exploit vulnerabilities in browsers and plugins
πŸ“ Explanation: Drive-by downloads occur when a user visits a compromised website, which automatically downloads and executes malware by exploiting browser or plugin vulnerabilities.


3. How can hackers use USB devices to spread malware?

πŸ”˜ A) By disguising malware as a movie file
πŸ”˜ B) By using autorun features to execute malware automatically
πŸ”˜ C) By requiring users to install a special driver
πŸ”˜ D) By hiding malware inside Wi-Fi signals

βœ… Answer: B) By using autorun features to execute malware automatically
πŸ“ Explanation: Some malware-laden USBs exploit the autorun feature, which can automatically execute a malicious file once plugged into a computer.


4. What technique is commonly used in malvertising?

πŸ”˜ A) Malware embedded in video games
πŸ”˜ B) Hiding malicious code inside advertisements on legitimate websites
πŸ”˜ C) Sending malware via Bluetooth spam
πŸ”˜ D) Encrypting malware inside images

βœ… Answer: B) Hiding malicious code inside advertisements on legitimate websites
πŸ“ Explanation: Malvertising involves injecting malicious ads into ad networks, which then appear on legitimate websites and can infect users who click on them.


5. What is a watering hole attack?

πŸ”˜ A) Infecting websites frequently visited by a target group
πŸ”˜ B) Spreading malware through public drinking water systems
πŸ”˜ C) Hacking only high-security government websites
πŸ”˜ D) Infecting computers using phishing emails

βœ… Answer: A) Infecting websites frequently visited by a target group
πŸ“ Explanation: A watering hole attack infects specific websites that are commonly visited by the target audience, leading to malware infections.


6. How does ransomware typically spread?

πŸ”˜ A) Phishing emails and exploit kits
πŸ”˜ B) Directly modifying system BIOS
πŸ”˜ C) Only through infected USB drives
πŸ”˜ D) Manually installed by attackers on physical computers

βœ… Answer: A) Phishing emails and exploit kits
πŸ“ Explanation: Ransomware is commonly spread through phishing emails that contain malicious attachments or links, as well as exploit kits that take advantage of software vulnerabilities.


7. What is an exploit kit?

πŸ”˜ A) A toolkit used by developers to test exploits
πŸ”˜ B) A collection of vulnerabilities that automate malware infection
πŸ”˜ C) A security tool to detect malware
πŸ”˜ D) A set of antivirus software features

βœ… Answer: B) A collection of vulnerabilities that automate malware infection
πŸ“ Explanation: Exploit kits are automated tools used by cybercriminals to scan for and exploit vulnerabilities on a user’s device to deliver malware.


8. What is a trojanized application?

πŸ”˜ A) A legitimate app containing hidden malware
πŸ”˜ B) An application that can only be installed on a Trojan horse
πŸ”˜ C) A security software designed to fight trojans
πŸ”˜ D) A program that removes all malware from a system

βœ… Answer: A) A legitimate app containing hidden malware
πŸ“ Explanation: A trojanized application appears to be legitimate software but contains hidden malicious code that executes when installed.


9. What role do botnets play in malware distribution?

πŸ”˜ A) They directly execute malware on infected machines
πŸ”˜ B) They distribute malware to other devices through coordinated attacks
πŸ”˜ C) They are used for removing malware
πŸ”˜ D) They are security tools used by ethical hackers

βœ… Answer: B) They distribute malware to other devices through coordinated attacks
πŸ“ Explanation: Botnets consist of compromised machines controlled by an attacker to distribute malware, launch DDoS attacks, and perform other malicious activities.


10. What makes spear phishing more dangerous than regular phishing?

πŸ”˜ A) It targets specific individuals with customized messages
πŸ”˜ B) It is only used by nation-state attackers
πŸ”˜ C) It requires physical access to the victim’s computer
πŸ”˜ D) It is undetectable by all security software

βœ… Answer: A) It targets specific individuals with customized messages
πŸ“ Explanation: Spear phishing is a targeted attack where attackers craft personalized emails to deceive specific victims into opening malicious attachments or links.


11. What is β€œMalware-as-a-Service (MaaS)” in the cybercrime industry?

πŸ”˜ A) A legitimate cybersecurity service for malware testing
πŸ”˜ B) Cybercriminals selling pre-made malware to others
πŸ”˜ C) A cloud-based malware scanner
πŸ”˜ D) A service offered by antivirus companies

βœ… Answer: B) Cybercriminals selling pre-made malware to others
πŸ“ Explanation: Malware-as-a-Service (MaaS) allows criminals to rent or buy malware, enabling even non-technical attackers to deploy sophisticated threats.


12. Which network protocol is commonly abused to spread malware in corporate environments?

πŸ”˜ A) FTP (File Transfer Protocol)
πŸ”˜ B) SMB (Server Message Block)
πŸ”˜ C) SNMP (Simple Network Management Protocol)
πŸ”˜ D) DNS (Domain Name System)

βœ… Answer: B) SMB (Server Message Block)
πŸ“ Explanation: SMB is frequently exploited for lateral movement within networks, as seen in attacks like WannaCry and EternalBlue.


13. What is the primary function of a Command and Control (C2) server in malware attacks?

πŸ”˜ A) To distribute software updates
πŸ”˜ B) To communicate with and control infected devices
πŸ”˜ C) To provide encryption for malware
πŸ”˜ D) To detect and remove malware from networks

βœ… Answer: B) To communicate with and control infected devices
πŸ“ Explanation: C2 servers allow attackers to send commands to infected machines, execute malware remotely, and exfiltrate data.


14. What is an example of fileless malware?

πŸ”˜ A) A malicious PDF attachment
πŸ”˜ B) A trojanized mobile app
πŸ”˜ C) A PowerShell script executing malicious commands in memory
πŸ”˜ D) A self-replicating virus

βœ… Answer: C) A PowerShell script executing malicious commands in memory
πŸ“ Explanation: Fileless malware operates in memory without leaving files on disk, making it harder for antivirus software to detect.


15. Which type of file is most commonly used in phishing emails to deliver malware?

πŸ”˜ A) Executable (.exe) files
πŸ”˜ B) Microsoft Office documents with macros
πŸ”˜ C) Audio (.mp3) files
πŸ”˜ D) ZIP archives with images

βœ… Answer: B) Microsoft Office documents with macros
πŸ“ Explanation: Attackers embed malicious macros in Office files (e.g., .docm, .xlsm) to execute malware when opened by users.


16. How do cybercriminals use steganography to distribute malware?

πŸ”˜ A) By using deepfake videos to trick victims
πŸ”˜ B) By hiding malicious code inside images, videos, or audio files
πŸ”˜ C) By encrypting malware with public keys
πŸ”˜ D) By spoofing DNS records to redirect users

βœ… Answer: B) By hiding malicious code inside images, videos, or audio files
πŸ“ Explanation: Steganography allows attackers to conceal malicious payloads within seemingly innocent media files.


17. What is a key characteristic of polymorphic malware?

πŸ”˜ A) It constantly changes its code to evade detection
πŸ”˜ B) It only affects mobile devices
πŸ”˜ C) It disables antivirus software permanently
πŸ”˜ D) It spreads exclusively via social media

βœ… Answer: A) It constantly changes its code to evade detection
πŸ“ Explanation: Polymorphic malware modifies its signature and code on each infection, making signature-based detection difficult.


18. What is an example of social engineering for malware delivery?

πŸ”˜ A) Exploiting a zero-day vulnerability
πŸ”˜ B) Tricking users into installing fake security updates
πŸ”˜ C) Using a botnet for DDoS attacks
πŸ”˜ D) Encrypting malware files with strong algorithms

βœ… Answer: B) Tricking users into installing fake security updates
πŸ“ Explanation: Fake software updates (e.g., “Update your Flash Player” scams) trick users into downloading malware.


19. How can attackers use cloud services for malware distribution?

πŸ”˜ A) Hosting malicious payloads on cloud storage services
πŸ”˜ B) Encrypting all user data in the cloud
πŸ”˜ C) Running malware inside containerized environments
πŸ”˜ D) Exploiting misconfigured cloud backup systems

βœ… Answer: A) Hosting malicious payloads on cloud storage services
πŸ“ Explanation: Attackers upload malware to platforms like Google Drive, Dropbox, and AWS, disguising it as legitimate files.


20. What is the main advantage of using encrypted malware communication?

πŸ”˜ A) It makes malware impossible to detect
πŸ”˜ B) It prevents security analysts from reversing the malware
πŸ”˜ C) It avoids detection by network security tools
πŸ”˜ D) It allows malware to run without internet access

βœ… Answer: C) It avoids detection by network security tools
πŸ“ Explanation: Encrypted malware traffic (e.g., TLS-encrypted C2 communication) prevents security tools from inspecting malicious payloads.


21. How do attackers use rogue Wi-Fi hotspots to deliver malware?

πŸ”˜ A) By displaying fake Captcha screens
πŸ”˜ B) By injecting malicious code into unencrypted traffic
πŸ”˜ C) By using RFID skimming techniques
πŸ”˜ D) By distributing malware through SMS messages

βœ… Answer: B) By injecting malicious code into unencrypted traffic
πŸ“ Explanation: Attackers set up rogue Wi-Fi hotspots to intercept and inject malware into HTTP traffic.


22. What is a macro virus?

πŸ”˜ A) A virus that infects only kernel-level processes
πŸ”˜ B) Malware embedded in document macros
πŸ”˜ C) A Linux-only trojan
πŸ”˜ D) A highly advanced polymorphic virus

βœ… Answer: B) Malware embedded in document macros
πŸ“ Explanation: Macro viruses are malicious scripts embedded in Office documents that execute when macros are enabled.


23. How can QR codes be used for malware delivery?

πŸ”˜ A) By embedding malicious URLs in QR codes
πŸ”˜ B) By storing malware files directly inside QR images
πŸ”˜ C) By encrypting malware payloads with QR cryptography
πŸ”˜ D) By bypassing antivirus protection using QR-based malware

βœ… Answer: A) By embedding malicious URLs in QR codes
πŸ“ Explanation: Attackers create QR codes that redirect users to malware-infected sites when scanned.


24. What type of malware disguises itself as a legitimate program?

πŸ”˜ A) Worm
πŸ”˜ B) Trojan Horse
πŸ”˜ C) Adware
πŸ”˜ D) Botnet

βœ… Answer: B) Trojan Horse
πŸ“ Explanation: Trojan malware appears as a legitimate program but contains hidden malicious functionality.


25. What technique allows malware to persist even after rebooting?

πŸ”˜ A) Registry modifications
πŸ”˜ B) Encrypting the MBR (Master Boot Record)
πŸ”˜ C) Running in kernel mode
πŸ”˜ D) Using code obfuscation

βœ… Answer: A) Registry modifications
πŸ“ Explanation: Malware often adds itself to Windows Registry startup keys to ensure persistence.


26. What is an example of malware delivered via supply chain attacks?

πŸ”˜ A) Stuxnet
πŸ”˜ B) Petya ransomware
πŸ”˜ C) EternalBlue exploit
πŸ”˜ D) DNS hijacking

βœ… Answer: A) Stuxnet
πŸ“ Explanation: Stuxnet was delivered through compromised industrial software updates, a classic supply chain attack.


27. How do attackers spread malware through Discord and Telegram?

πŸ”˜ A) By using chatbots to send malicious commands
πŸ”˜ B) By distributing malware-infected files and links
πŸ”˜ C) By modifying users’ profile settings remotely
πŸ”˜ D) By launching DDoS attacks against servers

βœ… Answer: B) By distributing malware-infected files and links
πŸ“ Explanation: Attackers upload infected files to chat platforms like Discord and Telegram to distribute malware.


28. What is rogue software?

πŸ”˜ A) Legitimate software with minor vulnerabilities
πŸ”˜ B) Fake security programs that deliver malware
πŸ”˜ C) Outdated applications
πŸ”˜ D) A program that runs on rogue operating systems

βœ… Answer: B) Fake security programs that deliver malware
πŸ“ Explanation: Rogue software (e.g., fake antivirus programs) tricks users into installing malware.


29. Which type of attack exploits legitimate software updates to deliver malware?

πŸ”˜ A) Supply Chain Attack
πŸ”˜ B) Zero-Day Attack
πŸ”˜ C) Keylogger Attack
πŸ”˜ D) Social Engineering Attack

βœ… Answer: A) Supply Chain Attack
πŸ“ Explanation: A supply chain attack occurs when attackers compromise software updates or developer tools to distribute malware to many users.


30. What is a botnet primarily used for in malware distribution?

πŸ”˜ A) Launching DDoS attacks
πŸ”˜ B) Spreading malware to other devices
πŸ”˜ C) Encrypting files for ransomware
πŸ”˜ D) Scanning networks for open ports

βœ… Answer: B) Spreading malware to other devices
πŸ“ Explanation: A botnet consists of infected computers controlled by an attacker, often used to distribute malware to new victims.


31. How do attackers use browser extensions for malware distribution?

πŸ”˜ A) By inserting malicious scripts into web pages
πŸ”˜ B) By using browser extensions as keyloggers
πŸ”˜ C) By injecting ads that redirect to malicious sites
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious browser extensions can steal data, act as keyloggers, and insert malicious ads or scripts into web pages.


32. How does malspam (malicious spam) distribute malware?

πŸ”˜ A) By sending phishing emails with malware attachments
πŸ”˜ B) By infecting legitimate websites with malicious code
πŸ”˜ C) By using RFID-based attacks
πŸ”˜ D) By exploiting weaknesses in mobile networks

βœ… Answer: A) By sending phishing emails with malware attachments
πŸ“ Explanation: Malspam delivers malware through phishing emails, often with infected attachments or malicious links.


33. What is a rogue access point in malware attacks?

πŸ”˜ A) A fake Wi-Fi network used to inject malware
πŸ”˜ B) A security feature of firewalls
πŸ”˜ C) A hacking tool used by ethical hackers
πŸ”˜ D) A legitimate feature of VPNs

βœ… Answer: A) A fake Wi-Fi network used to inject malware
πŸ“ Explanation: Attackers create rogue access points to trick users into connecting, allowing them to inject malware into traffic.


34. How do cybercriminals use Remote Access Trojans (RATs) to distribute malware?

πŸ”˜ A) By gaining full control over the victim’s device
πŸ”˜ B) By tricking users into executing a trojanized file
πŸ”˜ C) By using keyloggers to steal credentials
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: RATs allow attackers to take full control of a victim’s machine, log keystrokes, and install additional malware.


35. What is the primary danger of malware spread via torrent downloads?

πŸ”˜ A) Users might download copyrighted content
πŸ”˜ B) Attackers embed malware in pirated software and media files
πŸ”˜ C) Torrent clients are known to be vulnerable to attacks
πŸ”˜ D) Torrenting increases CPU usage

βœ… Answer: B) Attackers embed malware in pirated software and media files
πŸ“ Explanation: Many pirated software downloads contain trojans, keyloggers, or ransomware, making torrents a common malware delivery vector.


36. How can cybercriminals distribute malware through fake tech support scams?

πŸ”˜ A) By convincing users to install remote access tools
πŸ”˜ B) By exploiting vulnerabilities in outdated browsers
πŸ”˜ C) By performing automated brute force attacks
πŸ”˜ D) By encrypting user data remotely

βœ… Answer: A) By convincing users to install remote access tools
πŸ“ Explanation: Fake tech support scams trick users into installing malware disguised as “security fixes” or “remote support tools.”


37. What is the primary method of malware distribution in mobile devices?

πŸ”˜ A) Fake apps from third-party app stores
πŸ”˜ B) Bluetooth attacks
πŸ”˜ C) QR code-based phishing
πŸ”˜ D) Social engineering

βœ… Answer: A) Fake apps from third-party app stores
πŸ“ Explanation: Attackers upload trojanized apps to third-party app stores, tricking users into installing malware.


38. What is the purpose of rootkits in malware attacks?

πŸ”˜ A) To gain persistent, hidden access to a system
πŸ”˜ B) To execute DDoS attacks on web servers
πŸ”˜ C) To encrypt user data for ransom
πŸ”˜ D) To send phishing emails

βœ… Answer: A) To gain persistent, hidden access to a system
πŸ“ Explanation: Rootkits allow malware to operate stealthily, hiding its presence from antivirus software.


39. How do attackers use SEO poisoning for malware distribution?

πŸ”˜ A) By manipulating search engine results to lead users to infected sites
πŸ”˜ B) By hacking search engine algorithms directly
πŸ”˜ C) By tricking users into disabling browser security settings
πŸ”˜ D) By embedding malware into website banners

βœ… Answer: A) By manipulating search engine results to lead users to infected sites
πŸ“ Explanation: SEO poisoning involves tricking search engines into ranking malicious sites higher in results.


40. What is the role of exploit kits in malware distribution?

πŸ”˜ A) They automate the exploitation of system vulnerabilities
πŸ”˜ B) They distribute security patches for vulnerabilities
πŸ”˜ C) They prevent malware from being detected
πŸ”˜ D) They are used only in ethical hacking

βœ… Answer: A) They automate the exploitation of system vulnerabilities
πŸ“ Explanation: Exploit kits scan for unpatched vulnerabilities and automate malware infection.


41. What is a major risk of using cracked software?

πŸ”˜ A) It may contain embedded malware
πŸ”˜ B) It can slow down system performance
πŸ”˜ C) It is often detected by firewalls
πŸ”˜ D) It increases the cost of digital licensing

βœ… Answer: A) It may contain embedded malware
πŸ“ Explanation: Many cracked software versions include trojans, spyware, or ransomware.


42. How does clipboard hijacking work in malware attacks?

πŸ”˜ A) Malware replaces copied cryptocurrency wallet addresses
πŸ”˜ B) It steals clipboard data for spam messages
πŸ”˜ C) It prevents users from copying passwords
πŸ”˜ D) It corrupts clipboard files permanently

βœ… Answer: A) Malware replaces copied cryptocurrency wallet addresses
πŸ“ Explanation: Clipboard hijackers monitor copied text and replace crypto wallet addresses with attacker-controlled ones.


43. How does “clickjacking” contribute to malware distribution?

πŸ”˜ A) By tricking users into clicking hidden malicious elements
πŸ”˜ B) By replacing browser homepages with phishing pages
πŸ”˜ C) By hijacking social media accounts
πŸ”˜ D) By executing brute force attacks

βœ… Answer: A) By tricking users into clicking hidden malicious elements
πŸ“ Explanation: Clickjacking overlays invisible elements on legitimate web pages, making users unknowingly trigger malware downloads.


44. How do cybercriminals use email spoofing for malware distribution?

πŸ”˜ A) By making phishing emails appear to come from trusted senders
πŸ”˜ B) By sending malware directly from legitimate security firms
πŸ”˜ C) By hacking into victims’ email accounts
πŸ”˜ D) By embedding malware in email attachments

βœ… Answer: A) By making phishing emails appear to come from trusted senders
πŸ“ Explanation: Email spoofing makes malicious emails appear legitimate, increasing the likelihood of successful infections.


45. How do malicious browser push notifications distribute malware?

πŸ”˜ A) By forcing users to download files via JavaScript
πŸ”˜ B) By displaying fake system alerts that lead to malware sites
πŸ”˜ C) By modifying browser security settings remotely
πŸ”˜ D) By using browser extensions to install malware automatically

βœ… Answer: B) By displaying fake system alerts that lead to malware sites
πŸ“ Explanation: Malicious push notifications trick users into clicking fake alerts, which redirect them to malware-infected websites.


46. How does DNS hijacking enable malware distribution?

πŸ”˜ A) By redirecting users to malicious websites without their knowledge
πŸ”˜ B) By modifying domain registration records
πŸ”˜ C) By launching DDoS attacks on DNS servers
πŸ”˜ D) By encrypting DNS traffic to hide malware

βœ… Answer: A) By redirecting users to malicious websites without their knowledge
πŸ“ Explanation: DNS hijacking manipulates domain resolution, redirecting users to phishing or malware-infected sites.


47. What is scareware?

πŸ”˜ A) Malware that encrypts files for ransom
πŸ”˜ B) Fake security alerts that trick users into downloading malware
πŸ”˜ C) Malware that deletes files after a countdown
πŸ”˜ D) A tool used by hackers to remove security software

βœ… Answer: B) Fake security alerts that trick users into downloading malware
πŸ“ Explanation: Scareware displays fake warnings (e.g., “Your PC is infected!”) to trick users into downloading malicious software.


48. What is a fake codec scam?

πŸ”˜ A) A method where attackers trick users into installing malware disguised as a video codec
πŸ”˜ B) A technique for bypassing antivirus detection
πŸ”˜ C) A browser exploit that modifies JavaScript execution
πŸ”˜ D) A way to inject malware into online streaming services

βœ… Answer: A) A method where attackers trick users into installing malware disguised as a video codec
πŸ“ Explanation: Fake codec scams prompt users to install a “required codec” to play a video, but the download contains malware.


49. How does spyware typically distribute itself?

πŸ”˜ A) Through trojanized applications and freeware downloads
πŸ”˜ B) Only via infected USB devices
πŸ”˜ C) By exploiting hardware vulnerabilities
πŸ”˜ D) By modifying operating system files

βœ… Answer: A) Through trojanized applications and freeware downloads
πŸ“ Explanation: Spyware is often hidden in freeware, trojanized apps, and phishing emails, secretly collecting user data.


50. How does malware hide inside legitimate email attachments?

πŸ”˜ A) By embedding malicious scripts in Word, Excel, or PDF files
πŸ”˜ B) By modifying the email’s metadata
πŸ”˜ C) By encrypting itself within ZIP archives
πŸ”˜ D) By exploiting email headers

βœ… Answer: A) By embedding malicious scripts in Word, Excel, or PDF files
πŸ“ Explanation: Malware often hides in document macros or PDF exploits, executing when the user opens the file.


51. What is Fast Flux, and how is it used in malware distribution?

πŸ”˜ A) A technique to rapidly change DNS records to hide malware servers
πŸ”˜ B) A type of high-speed ransomware attack
πŸ”˜ C) A botnet that spreads through email attachments
πŸ”˜ D) A method of injecting malware into fast-loading web pages

βœ… Answer: A) A technique to rapidly change DNS records to hide malware servers
πŸ“ Explanation: Fast Flux allows attackers to quickly rotate IP addresses, making it harder to take down malicious infrastructure.


52. How do cybercriminals use cryptocurrency mining malware (cryptojacking)?

πŸ”˜ A) By hijacking CPU or GPU resources to mine cryptocurrency
πŸ”˜ B) By stealing cryptocurrency from digital wallets
πŸ”˜ C) By encrypting cryptocurrency transactions
πŸ”˜ D) By disguising themselves as legitimate crypto trading platforms

βœ… Answer: A) By hijacking CPU or GPU resources to mine cryptocurrency
πŸ“ Explanation: Cryptojacking malware secretly uses a victim’s computing power to mine cryptocurrency for the attacker.


53. How do hackers use social media to spread malware?

πŸ”˜ A) By posting malicious links disguised as viral content
πŸ”˜ B) By hacking social media accounts to send malware-infected messages
πŸ”˜ C) By embedding malware in downloadable “cheat” files for games
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Hackers exploit social media by spreading malicious links, phishing scams, and infected downloads.


54. What is a rogue software update attack?

πŸ”˜ A) An attack where malware is disguised as a legitimate software update
πŸ”˜ B) A method of bypassing firewalls
πŸ”˜ C) A way to disable antivirus software
πŸ”˜ D) A vulnerability in cloud storage systems

βœ… Answer: A) An attack where malware is disguised as a legitimate software update
πŸ“ Explanation: Attackers fake software updates (e.g., “Update your browser”) to trick users into installing malware.


55. How do attackers use malicious shortened URLs for malware distribution?

πŸ”˜ A) By disguising malware links in shortened URLs (e.g., Bit.ly, TinyURL)
πŸ”˜ B) By injecting malware into URL shortening services
πŸ”˜ C) By exploiting social media preview features
πŸ”˜ D) By modifying DNS settings remotely

βœ… Answer: A) By disguising malware links in shortened URLs (e.g., Bit.ly, TinyURL)
πŸ“ Explanation: Shortened URLs hide malicious domains, leading victims to malware-infected sites.


56. What is an example of malware being spread through pirated software?

πŸ”˜ A) Keygen programs containing trojans
πŸ”˜ B) Open-source software hosting malware
πŸ”˜ C) Encrypted email attachments
πŸ”˜ D) DNS tunneling attacks

βœ… Answer: A) Keygen programs containing trojans
πŸ“ Explanation: Many pirated software “keygens” contain hidden malware, infecting users when executed.


57. How do attackers use malspam campaigns to distribute malware?

πŸ”˜ A) By sending mass phishing emails with malicious attachments
πŸ”˜ B) By hacking into email servers directly
πŸ”˜ C) By modifying antivirus signature databases
πŸ”˜ D) By injecting malware into cloud storage accounts

βœ… Answer: A) By sending mass phishing emails with malicious attachments
πŸ“ Explanation: Malspam campaigns use phishing emails to spread trojans, ransomware, and keyloggers.


58. How does mobile malware spread through SMS phishing (smishing)?

πŸ”˜ A) By sending fake text messages containing malicious links
πŸ”˜ B) By modifying SIM card encryption keys
πŸ”˜ C) By executing remote exploits via Bluetooth
πŸ”˜ D) By forcing users to install firewall software

βœ… Answer: A) By sending fake text messages containing malicious links
πŸ“ Explanation: Smishing tricks users into clicking malicious links in SMS messages, leading to malware infections.


59. What is the main way ransomware spreads in corporate networks?

πŸ”˜ A) Exploiting unpatched vulnerabilities and phishing attacks
πŸ”˜ B) Sending direct messages on social media
πŸ”˜ C) Infecting mobile devices first
πŸ”˜ D) Encrypting open-source software

βœ… Answer: A) Exploiting unpatched vulnerabilities and phishing attacks
πŸ“ Explanation: Ransomware often spreads via phishing emails and unpatched security flaws.


60. How does banking malware steal financial credentials?

πŸ”˜ A) By using keyloggers to capture typed credentials
πŸ”˜ B) By injecting malicious scripts into banking websites
πŸ”˜ C) By hijacking online banking sessions
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Banking malware steals credentials through keylogging, web injection, and session hijacking.


61. What is the primary way malware is delivered through cloud services?

πŸ”˜ A) Hosting malicious files on cloud storage platforms
πŸ”˜ B) Exploiting encryption algorithms
πŸ”˜ C) Modifying SSL certificates
πŸ”˜ D) Injecting malware into browser cookies

βœ… Answer: A) Hosting malicious files on cloud storage platforms
πŸ“ Explanation: Attackers upload malware to Google Drive, Dropbox, AWS, or other cloud platforms and share infected links.


62. How do attackers use rogue Android applications to distribute malware?

πŸ”˜ A) By embedding malicious payloads in fake apps
πŸ”˜ B) By modifying legitimate apps with additional malicious code
πŸ”˜ C) By publishing apps on third-party app stores instead of Google Play
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Cybercriminals create fake or modified Android apps and distribute them through third-party app stores.


63. What is a watering hole attack?

πŸ”˜ A) Compromising websites frequently visited by a target group
πŸ”˜ B) Sending phishing emails to employees of a company
πŸ”˜ C) Using malware to overload servers
πŸ”˜ D) Infecting mobile apps with spyware

βœ… Answer: A) Compromising websites frequently visited by a target group
πŸ“ Explanation: Attackers inject malware into trusted websites frequented by specific victims.


64. How do hackers use IoT devices to distribute malware?

πŸ”˜ A) By compromising vulnerable IoT devices to spread malware to other systems
πŸ”˜ B) By executing ransomware directly on IoT devices
πŸ”˜ C) By modifying the firmware of IoT devices to self-destruct
πŸ”˜ D) By using IoT devices to distribute spam emails

βœ… Answer: A) By compromising vulnerable IoT devices to spread malware to other systems
πŸ“ Explanation: IoT malware can infect routers, cameras, and smart devices, creating botnets for further malware distribution.


65. How does steganography help in malware delivery?

πŸ”˜ A) By hiding malicious code inside images, audio, or video files
πŸ”˜ B) By encrypting malware payloads
πŸ”˜ C) By using hidden folders to store malware
πŸ”˜ D) By embedding malware in PDFs

βœ… Answer: A) By hiding malicious code inside images, audio, or video files
πŸ“ Explanation: Steganography conceals malware payloads inside media files, bypassing antivirus detection.


66. How do attackers spread malware via file-sharing platforms?

πŸ”˜ A) By uploading infected executables disguised as software updates
πŸ”˜ B) By injecting malware into live streaming services
πŸ”˜ C) By modifying the metadata of shared files
πŸ”˜ D) By hacking into platform databases

βœ… Answer: A) By uploading infected executables disguised as software updates
πŸ“ Explanation: Malware is often distributed disguised as popular software, cracks, or keygens on file-sharing platforms.


67. How do cybercriminals use malvertising for malware distribution?

πŸ”˜ A) By placing malicious ads on legitimate websites
πŸ”˜ B) By hacking search engine ranking algorithms
πŸ”˜ C) By replacing website banners with phishing links
πŸ”˜ D) By encrypting ads to bypass ad-blockers

βœ… Answer: A) By placing malicious ads on legitimate websites
πŸ“ Explanation: Malicious ads can redirect users to exploit kits or force malware downloads.


68. What makes polymorphic malware hard to detect?

πŸ”˜ A) It constantly changes its code while keeping the same functionality
πŸ”˜ B) It can only execute inside virtual machines
πŸ”˜ C) It uses AI to target specific systems
πŸ”˜ D) It encrypts itself every time it runs

βœ… Answer: A) It constantly changes its code while keeping the same functionality
πŸ“ Explanation: Polymorphic malware modifies its signature, making it harder for traditional antivirus solutions to detect.


69. What is the role of exploit kits in malware delivery?

πŸ”˜ A) They identify and exploit software vulnerabilities automatically
πŸ”˜ B) They deliver patches to prevent malware
πŸ”˜ C) They generate unique encryption keys for malware
πŸ”˜ D) They are used only in ethical hacking

βœ… Answer: A) They identify and exploit software vulnerabilities automatically
πŸ“ Explanation: Exploit kits automate the process of finding and exploiting unpatched software vulnerabilities.


70. What is rogue security software?

πŸ”˜ A) Fake antivirus software that installs malware instead of removing it
πŸ”˜ B) A legitimate tool that scans for vulnerabilities
πŸ”˜ C) A penetration testing framework used by ethical hackers
πŸ”˜ D) A form of ransomware

βœ… Answer: A) Fake antivirus software that installs malware instead of removing it
πŸ“ Explanation: Rogue security software tricks users into downloading malware under the pretense of removing threats.


71. How do hackers use botnets for malware delivery?

πŸ”˜ A) By distributing malware to multiple systems simultaneously
πŸ”˜ B) By encrypting files before delivery
πŸ”˜ C) By launching direct SQL Injection attacks
πŸ”˜ D) By bypassing firewall security

βœ… Answer: A) By distributing malware to multiple systems simultaneously
πŸ“ Explanation: Botnets distribute malware at scale, infecting multiple systems for further exploitation.


72. What is a key characteristic of a rootkit?

πŸ”˜ A) It allows malware to remain undetected by modifying system files
πŸ”˜ B) It spreads only through removable media
πŸ”˜ C) It only affects mobile devices
πŸ”˜ D) It cannot persist after a system restart

βœ… Answer: A) It allows malware to remain undetected by modifying system files
πŸ“ Explanation: Rootkits hide malware by modifying system files and disabling security software.


73. How do hackers use phishing websites to distribute malware?

πŸ”˜ A) By mimicking legitimate sites to trick users into downloading infected files
πŸ”˜ B) By embedding malware directly into URLs
πŸ”˜ C) By modifying browser certificates
πŸ”˜ D) By creating fake search engine results

βœ… Answer: A) By mimicking legitimate sites to trick users into downloading infected files
πŸ“ Explanation: Phishing websites are designed to look like real sites and prompt users to download malware or enter credentials.


74. What is a key characteristic of fileless malware?

πŸ”˜ A) It operates in memory instead of writing files to disk
πŸ”˜ B) It hides inside ZIP archives
πŸ”˜ C) It infects only mobile devices
πŸ”˜ D) It is immune to security patches

βœ… Answer: A) It operates in memory instead of writing files to disk
πŸ“ Explanation: Fileless malware executes directly in RAM, making it difficult to detect and remove.


75. What is an example of malware propagation through removable media?

πŸ”˜ A) Auto-run malware on infected USB drives
πŸ”˜ B) Ransomware spreading through Bluetooth
πŸ”˜ C) Malware executing via online banking applications
πŸ”˜ D) Malware hidden in cloud storage links

βœ… Answer: A) Auto-run malware on infected USB drives
πŸ“ Explanation: Some malware exploits USB autorun features to automatically execute when plugged into a computer.


76. What is a distinguishing feature of ransomware?

πŸ”˜ A) It encrypts files and demands payment for decryption
πŸ”˜ B) It steals banking credentials
πŸ”˜ C) It spreads only through USB devices
πŸ”˜ D) It primarily affects IoT devices

βœ… Answer: A) It encrypts files and demands payment for decryption
πŸ“ Explanation: Ransomware locks access to files or systems and demands a ransom payment in cryptocurrency to restore access.


77. How do hackers spread malware through Discord and Telegram?

πŸ”˜ A) By sending malicious files disguised as legitimate content
πŸ”˜ B) By taking control of user accounts remotely
πŸ”˜ C) By modifying Discord’s core application
πŸ”˜ D) By intercepting messages using encryption flaws

βœ… Answer: A) By sending malicious files disguised as legitimate content
πŸ“ Explanation: Attackers upload malware-laced files to messaging platforms like Discord and Telegram and trick users into downloading them.


78. What is the primary function of a keylogger in malware attacks?

πŸ”˜ A) To secretly record keystrokes and steal sensitive information
πŸ”˜ B) To inject malicious code into search engine results
πŸ”˜ C) To encrypt files without user permission
πŸ”˜ D) To create fake accounts on social media

βœ… Answer: A) To secretly record keystrokes and steal sensitive information
πŸ“ Explanation: Keyloggers capture everything a user types, including passwords, credit card numbers, and personal messages.


79. How does a man-in-the-middle (MITM) attack help distribute malware?

πŸ”˜ A) By intercepting and modifying network traffic to inject malicious payloads
πŸ”˜ B) By forcing users to download fake PDF files
πŸ”˜ C) By encrypting all outgoing web traffic
πŸ”˜ D) By sending malware via Bluetooth beacons

βœ… Answer: A) By intercepting and modifying network traffic to inject malicious payloads
πŸ“ Explanation: In a MITM attack, hackers can modify HTTP or DNS traffic to redirect victims to malware-infected websites.


80. How do attackers use fake browser updates to deliver malware?

πŸ”˜ A) By displaying pop-ups that trick users into installing trojanized “update” files
πŸ”˜ B) By modifying browser settings remotely
πŸ”˜ C) By injecting malware directly into cookies
πŸ”˜ D) By forcing browsers into “safe mode” before launching attacks

βœ… Answer: A) By displaying pop-ups that trick users into installing trojanized “update” files
πŸ“ Explanation: Fake browser update messages prompt users to download malware disguised as a security update.


81. How do attackers use PDF exploits for malware delivery?

πŸ”˜ A) By embedding malicious JavaScript in PDF documents
πŸ”˜ B) By encrypting the PDF file with a ransomware payload
πŸ”˜ C) By modifying the metadata of PDFs
πŸ”˜ D) By using PDFs to initiate brute force attacks

βœ… Answer: A) By embedding malicious JavaScript in PDF documents
πŸ“ Explanation: Some malicious PDFs contain JavaScript exploits that execute malware when opened.


82. How does email spoofing help in malware distribution?

πŸ”˜ A) By making phishing emails appear as if they come from trusted sources
πŸ”˜ B) By modifying the recipient’s email settings
πŸ”˜ C) By blocking antivirus scans on attachments
πŸ”˜ D) By encrypting email attachments before delivery

βœ… Answer: A) By making phishing emails appear as if they come from trusted sources
πŸ“ Explanation: Email spoofing manipulates email headers to make phishing messages look like they’re from a legitimate sender.


83. What is an example of malware spreading via DNS tunneling?

πŸ”˜ A) Using DNS queries to send and receive malware commands
πŸ”˜ B) Encrypting DNS requests to bypass firewalls
πŸ”˜ C) Modifying browser DNS settings remotely
πŸ”˜ D) Injecting JavaScript into DNS requests

βœ… Answer: A) Using DNS queries to send and receive malware commands
πŸ“ Explanation: DNS tunneling allows attackers to bypass security controls and distribute malware via DNS traffic.


84. How does social engineering contribute to malware infections?

πŸ”˜ A) By tricking users into installing malware voluntarily
πŸ”˜ B) By modifying network security policies
πŸ”˜ C) By launching brute-force attacks on passwords
πŸ”˜ D) By altering encryption algorithms

βœ… Answer: A) By tricking users into installing malware voluntarily
πŸ“ Explanation: Attackers manipulate human behavior to convince users to download and execute malware.


85. What is the role of a botnet in distributing malware?

πŸ”˜ A) It acts as a network of infected devices to spread malware further
πŸ”˜ B) It encrypts all files before spreading them
πŸ”˜ C) It modifies firewall rules remotely
πŸ”˜ D) It is used only for cryptocurrency mining

βœ… Answer: A) It acts as a network of infected devices to spread malware further
πŸ“ Explanation: Botnets are used to distribute malware at scale, infecting thousands of devices simultaneously.


86. What is a common method of spreading malware through Bluetooth?

πŸ”˜ A) Exploiting vulnerabilities in Bluetooth pairing protocols
πŸ”˜ B) Encrypting Bluetooth signals with a malicious payload
πŸ”˜ C) Overloading Bluetooth frequencies to disrupt communication
πŸ”˜ D) Disguising malware as a Bluetooth audio file

βœ… Answer: A) Exploiting vulnerabilities in Bluetooth pairing protocols
πŸ“ Explanation: Attackers exploit weak Bluetooth security settings to install malware on nearby devices.


87. How do attackers use SMS phishing (smishing) for malware distribution?

πŸ”˜ A) By sending fake text messages containing malicious links
πŸ”˜ B) By modifying cellular network encryption
πŸ”˜ C) By executing direct SIM swap attacks
πŸ”˜ D) By embedding malware into voice calls

βœ… Answer: A) By sending fake text messages containing malicious links
πŸ“ Explanation: Smishing tricks users into clicking malicious links sent via SMS.


88. What is an example of malware hiding in cloud-based applications?

πŸ”˜ A) Malicious macros in shared cloud documents
πŸ”˜ B) Executable malware files disguised as PDFs
πŸ”˜ C) Infected ZIP files uploaded to cloud storage
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers use cloud platforms to distribute infected macros, PDFs, and ZIP files.


89. How do cybercriminals distribute malware through fake job postings?

πŸ”˜ A) By embedding malicious links in fake job applications
πŸ”˜ B) By requiring victims to download an “application form” that contains malware
πŸ”˜ C) By using phishing emails that appear to be from HR recruiters
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers use fake job postings to trick applicants into downloading malware.


90. How does malware exploit security misconfigurations in web applications?

πŸ”˜ A) By injecting malicious scripts via input fields
πŸ”˜ B) By bypassing authentication mechanisms
πŸ”˜ C) By exploiting default credentials on admin panels
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers exploit misconfigured security settings to inject malware, bypass authentication, and escalate privileges.


91. How do attackers use compromised WordPress sites to distribute malware?

πŸ”˜ A) By injecting malicious JavaScript into web pages
πŸ”˜ B) By adding backdoors to plugins and themes
πŸ”˜ C) By redirecting visitors to phishing sites
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Hackers compromise WordPress sites to inject malicious JavaScript, backdoors, and redirections, leading to malware infections.


92. What is the primary goal of malware hidden in browser extensions?

πŸ”˜ A) To steal browser cookies and session data
πŸ”˜ B) To bypass antivirus software
πŸ”˜ C) To disable JavaScript execution
πŸ”˜ D) To modify DNS records

βœ… Answer: A) To steal browser cookies and session data
πŸ“ Explanation: Malicious browser extensions can steal user data, track browsing activity, and hijack login sessions.


93. How do attackers use fake CAPTCHA pages to distribute malware?

πŸ”˜ A) By tricking users into enabling malicious browser notifications
πŸ”˜ B) By running malware scripts when users click “Verify”
πŸ”˜ C) By using hidden iframes to execute downloads
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake CAPTCHA pages use social engineering to make users click buttons that trigger malware downloads or unwanted browser permissions.


94. How can attackers distribute malware through compromised email accounts?

πŸ”˜ A) By sending phishing emails with malicious attachments
πŸ”˜ B) By embedding malware in email signatures
πŸ”˜ C) By inserting malicious links into forwarded conversations
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Compromised email accounts allow attackers to spread malware through phishing emails, email signatures, and infected attachments.


95. What is a characteristic of “silent” malware infections?

πŸ”˜ A) The malware runs in the background without user awareness
πŸ”˜ B) The malware encrypts files but doesn’t demand a ransom
πŸ”˜ C) The malware deletes itself after execution
πŸ”˜ D) The malware displays fake security alerts

βœ… Answer: A) The malware runs in the background without user awareness
πŸ“ Explanation: Silent malware infections operate stealthily, stealing data or controlling systems without detection.


96. How do attackers use fake invoice emails to spread malware?

πŸ”˜ A) By attaching infected Excel or PDF files
πŸ”˜ B) By embedding malicious links in email content
πŸ”˜ C) By impersonating legitimate companies
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake invoice emails often contain malicious attachments, phishing links, and impersonate real businesses.


97. What is the primary risk of downloading pirated video games?

πŸ”˜ A) The game might not work properly
πŸ”˜ B) The game may contain hidden trojans or ransomware
πŸ”˜ C) The download speed is usually slow
πŸ”˜ D) The file format may not be compatible with the system

βœ… Answer: B) The game may contain hidden trojans or ransomware
πŸ“ Explanation: Cracked and pirated games often include trojans, keyloggers, and ransomware, infecting systems when executed.


98. What is “USB Rubber Ducky” in malware attacks?

πŸ”˜ A) A malicious USB device that executes pre-programmed scripts
πŸ”˜ B) A virus that spreads through Bluetooth devices
πŸ”˜ C) A tool used to detect infected USB drives
πŸ”˜ D) A keylogger hidden inside a USB mouse

βœ… Answer: A) A malicious USB device that executes pre-programmed scripts
πŸ“ Explanation: The USB Rubber Ducky mimics a keyboard and executes automated attack scripts when plugged into a system.


99. How does “malicious PDF embedding” work?

πŸ”˜ A) By hiding JavaScript exploits inside PDF files
πŸ”˜ B) By modifying PDF metadata to redirect users to malware sites
πŸ”˜ C) By encrypting malware payloads inside PDFs
πŸ”˜ D) By creating fake error messages that trigger malware execution

βœ… Answer: A) By hiding JavaScript exploits inside PDF files
πŸ“ Explanation: Malicious PDFs contain embedded JavaScript exploits that execute malware when opened.


100. How do attackers distribute malware through online advertisements?

πŸ”˜ A) By injecting malicious code into ad networks
πŸ”˜ B) By displaying fake download buttons on websites
πŸ”˜ C) By redirecting users to exploit kits
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malvertising spreads malware by infecting ad networks, tricking users with fake buttons, and using redirects to exploit kits.


101. What is an example of a firmware-based malware attack?

πŸ”˜ A) BIOS rootkits that persist even after OS reinstallation
πŸ”˜ B) Browser hijackers that modify search results
πŸ”˜ C) Keyloggers hidden in software installers
πŸ”˜ D) Malware hidden in MS Word macros

βœ… Answer: A) BIOS rootkits that persist even after OS reinstallation
πŸ“ Explanation: Firmware-based malware infects BIOS/UEFI, making it difficult to detect and remove.


102. How does malware spread via QR code phishing?

πŸ”˜ A) By redirecting users to malicious websites when scanned
πŸ”˜ B) By executing malware through Bluetooth connections
πŸ”˜ C) By modifying NFC settings on mobile devices
πŸ”˜ D) By injecting JavaScript into mobile apps

βœ… Answer: A) By redirecting users to malicious websites when scanned
πŸ“ Explanation: QR phishing (Quishing) directs victims to malware-infected websites when scanned.


103. How do attackers use “rogue proxies” to distribute malware?

πŸ”˜ A) By hijacking network traffic and injecting malicious payloads
πŸ”˜ B) By forcing victims to download fake certificates
πŸ”˜ C) By creating VPN-like malware tunnels
πŸ”˜ D) By blocking security software updates

βœ… Answer: A) By hijacking network traffic and injecting malicious payloads
πŸ“ Explanation: Rogue proxies intercept network traffic and deliver malicious payloads to victims.


104. What is “payload obfuscation” in malware distribution?

πŸ”˜ A) Hiding the malware’s code to avoid detection
πŸ”˜ B) Encrypting malware to prevent execution
πŸ”˜ C) Disguising ransomware as legitimate files
πŸ”˜ D) Injecting malware directly into browser cache

βœ… Answer: A) Hiding the malware’s code to avoid detection
πŸ“ Explanation: Obfuscation alters malware signatures, making it harder for antivirus software to detect threats.


105. How do attackers use “clickbait” tactics to distribute malware?

πŸ”˜ A) By using misleading headlines to trick users into clicking infected links
πŸ”˜ B) By embedding malware inside HTML buttons
πŸ”˜ C) By injecting exploits into trending news pages
πŸ”˜ D) By modifying browser cookies to execute malware

βœ… Answer: A) By using misleading headlines to trick users into clicking infected links
πŸ“ Explanation: Clickbait malware tricks users into clicking malicious links by using sensational headlines.


106. How does malware spread through hacked smart home devices?

πŸ”˜ A) By exploiting weak passwords and unpatched firmware vulnerabilities
πŸ”˜ B) By sending phishing emails from smart TVs
πŸ”˜ C) By executing ransomware inside home security cameras
πŸ”˜ D) By modifying device encryption algorithms

βœ… Answer: A) By exploiting weak passwords and unpatched firmware vulnerabilities
πŸ“ Explanation: Attackers target poorly secured IoT devices (e.g., routers, security cameras, smart speakers) to install malware or create botnets.


107. How does “search engine poisoning” lead to malware infections?

πŸ”˜ A) By manipulating search engine rankings to push malicious websites
πŸ”˜ B) By injecting malware into search bar queries
πŸ”˜ C) By using hidden browser bookmarks
πŸ”˜ D) By modifying browser homepages remotely

βœ… Answer: A) By manipulating search engine rankings to push malicious websites
πŸ“ Explanation: Search engine poisoning ranks malware-hosting sites higher in search results, tricking users into clicking them.


108. How does “rogue mobile banking malware” operate?

πŸ”˜ A) By intercepting SMS-based two-factor authentication (2FA) codes
πŸ”˜ B) By forcing users to factory reset their devices
πŸ”˜ C) By modifying encrypted financial transactions
πŸ”˜ D) By disabling all banking apps on a device

βœ… Answer: A) By intercepting SMS-based two-factor authentication (2FA) codes
πŸ“ Explanation: Rogue banking malware steals 2FA codes to bypass security protections and hijack accounts.


109. How does “voice phishing (vishing)” assist in malware delivery?

πŸ”˜ A) By tricking victims into downloading malware over a phone call
πŸ”˜ B) By injecting malware into VoIP calls
πŸ”˜ C) By using speech-to-text malware delivery
πŸ”˜ D) By modifying call encryption algorithms

βœ… Answer: A) By tricking victims into downloading malware over a phone call
πŸ“ Explanation: Vishing (voice phishing) attackers impersonate tech support or banks, convincing victims to install malware.


110. How do attackers use “browser exploits” to spread malware?

πŸ”˜ A) By exploiting unpatched browser vulnerabilities to execute malicious code
πŸ”˜ B) By modifying search bar queries to inject payloads
πŸ”˜ C) By forcing users to install browser extensions
πŸ”˜ D) By redirecting users to social engineering websites

βœ… Answer: A) By exploiting unpatched browser vulnerabilities to execute malicious code
πŸ“ Explanation: Browser exploits target security flaws in browsers (e.g., Chrome, Firefox, Edge) to run malware automatically.


111. What is the role of WebSockets in malware distribution?

πŸ”˜ A) They enable real-time communication that can be hijacked for malware delivery
πŸ”˜ B) They allow attackers to send phishing emails in bulk
πŸ”˜ C) They provide a secure way to prevent malware infections
πŸ”˜ D) They are only used in banking applications

βœ… Answer: A) They enable real-time communication that can be hijacked for malware delivery
πŸ“ Explanation: WebSocket attacks can allow malware to bypass traditional security filters and deliver real-time payloads.


112. How do attackers use fake online surveys to distribute malware?

πŸ”˜ A) By tricking users into downloading “survey completion rewards” that contain malware
πŸ”˜ B) By modifying survey responses to inject malware
πŸ”˜ C) By using surveys to encrypt data remotely
πŸ”˜ D) By hijacking survey results to steal passwords

βœ… Answer: A) By tricking users into downloading “survey completion rewards” that contain malware
πŸ“ Explanation: Fake surveys promise free rewards, but users must download infected files to claim them.


113. How does “geo-targeted malware” work?

πŸ”˜ A) By detecting a user’s location and customizing attacks accordingly
πŸ”˜ B) By spreading malware through GPS signals
πŸ”˜ C) By infecting only government networks
πŸ”˜ D) By modifying Google Maps routes

βœ… Answer: A) By detecting a user’s location and customizing attacks accordingly
πŸ“ Explanation: Geo-targeted malware adjusts its behavior based on the victim’s location to evade security detection.


114. How do cybercriminals distribute malware via pirated eBooks?

πŸ”˜ A) By embedding malicious scripts inside PDF or EPUB files
πŸ”˜ B) By distributing books through AI-generated content
πŸ”˜ C) By modifying the text in eBooks
πŸ”˜ D) By hiding malware inside book covers

βœ… Answer: A) By embedding malicious scripts inside PDF or EPUB files
πŸ“ Explanation: Malicious eBooks contain hidden scripts that execute malware when opened.


115. How does “zero-click malware” infect a device?

πŸ”˜ A) By exploiting vulnerabilities without user interaction
πŸ”˜ B) By sending malicious push notifications
πŸ”˜ C) By requiring users to install software updates
πŸ”˜ D) By injecting malware into smartwatches

βœ… Answer: A) By exploiting vulnerabilities without user interaction
πŸ“ Explanation: Zero-click malware installs itself by exploiting system vulnerabilities, requiring no user action.


116. How do cybercriminals use AI-generated voices in malware distribution?

πŸ”˜ A) By impersonating real people in vishing scams
πŸ”˜ B) By encrypting voice messages with ransomware
πŸ”˜ C) By modifying VoIP signals for malware injection
πŸ”˜ D) By hijacking voice recognition systems

βœ… Answer: A) By impersonating real people in vishing scams
πŸ“ Explanation: AI voice generators create deepfake audio, tricking victims into downloading malware.


117. How does malware spread through video streaming platforms?

πŸ”˜ A) By embedding malicious links in video descriptions
πŸ”˜ B) By modifying video resolution settings
πŸ”˜ C) By forcing users to download plugins before watching
πŸ”˜ D) By altering the playback speed to trigger malware

βœ… Answer: A) By embedding malicious links in video descriptions
πŸ“ Explanation: Attackers use YouTube and other platforms to link users to infected downloads.


118. How do attackers use LinkedIn to distribute malware?

πŸ”˜ A) By sending fake job offers with infected attachments
πŸ”˜ B) By hijacking professional accounts for malware spreading
πŸ”˜ C) By embedding malware in direct messages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers exploit LinkedIn to distribute malware via fake job offers, compromised accounts, and phishing links.


119. How does malware spread through QR code-based restaurant menus?

πŸ”˜ A) By redirecting users to malware-infected websites
πŸ”˜ B) By modifying restaurant Wi-Fi settings
πŸ”˜ C) By hijacking payment transactions
πŸ”˜ D) By encrypting QR code data

βœ… Answer: A) By redirecting users to malware-infected websites
πŸ“ Explanation: Malicious QR codes direct customers to infected phishing sites when scanned.


120. How does malware use AI-generated content to bypass detection?

πŸ”˜ A) By using machine learning to rewrite malware payloads
πŸ”˜ B) By generating fake online reviews with embedded malware
πŸ”˜ C) By modifying code signatures dynamically
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: AI-powered malware adapts by rewriting its code, faking legitimacy, and avoiding detection.


121. How do cybercriminals use deepfake videos to spread malware?

πŸ”˜ A) By embedding malicious links in video descriptions
πŸ”˜ B) By impersonating trusted individuals to trick victims into downloading malware
πŸ”˜ C) By encrypting malware payloads inside video files
πŸ”˜ D) By modifying social media video settings

βœ… Answer: B) By impersonating trusted individuals to trick victims into downloading malware
πŸ“ Explanation: Deepfake technology allows attackers to create fake video messages from executives or celebrities, convincing victims to download infected files.


122. How does “Wi-Fi honeypot malware” work?

πŸ”˜ A) By setting up fake Wi-Fi networks to intercept traffic and inject malware
πŸ”˜ B) By encrypting Wi-Fi connections to prevent malware detection
πŸ”˜ C) By hiding malware in Wi-Fi passwords
πŸ”˜ D) By modifying router firmware remotely

βœ… Answer: A) By setting up fake Wi-Fi networks to intercept traffic and inject malware
πŸ“ Explanation: Attackers create rogue Wi-Fi networks to steal login credentials and inject malware into HTTP traffic.


123. How do attackers use fake customer service chatbots to distribute malware?

πŸ”˜ A) By sending phishing links disguised as support responses
πŸ”˜ B) By hijacking customer support conversations
πŸ”˜ C) By forcing users to download “support software” that contains malware
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake customer support chatbots can phish users, hijack conversations, and push malware-laced downloads.


124. How does “HTML smuggling” deliver malware?

πŸ”˜ A) By embedding malicious JavaScript inside HTML files
πŸ”˜ B) By exploiting HTTP headers to force malware execution
πŸ”˜ C) By modifying website source code to inject malware
πŸ”˜ D) By using browser cookies to bypass security

βœ… Answer: A) By embedding malicious JavaScript inside HTML files
πŸ“ Explanation: HTML smuggling hides malware inside HTML or JavaScript, triggering execution when opened in a browser.


125. How do attackers use cryptocurrency giveaway scams to deliver malware?

πŸ”˜ A) By tricking users into downloading fake crypto wallets that contain malware
πŸ”˜ B) By embedding malware inside cryptocurrency transactions
πŸ”˜ C) By using blockchain technology to spread malware
πŸ”˜ D) By modifying crypto exchange rates

βœ… Answer: A) By tricking users into downloading fake crypto wallets that contain malware
πŸ“ Explanation: Fake crypto giveaways often ask victims to download “wallet software” that contains malware or backdoors.


126. How does malware spread through smartwatches and fitness trackers?

πŸ”˜ A) By exploiting Bluetooth vulnerabilities to spread malware to connected devices
πŸ”˜ B) By modifying step-count data to deliver malware
πŸ”˜ C) By hiding malware inside fitness tracking apps
πŸ”˜ D) By using GPS data to distribute malicious payloads

βœ… Answer: A) By exploiting Bluetooth vulnerabilities to spread malware to connected devices
πŸ“ Explanation: Malware can jump from smartwatches to smartphones by exploiting insecure Bluetooth connections.


127. What is the main way “fileless malware” spreads?

πŸ”˜ A) By exploiting in-memory execution without leaving files on disk
πŸ”˜ B) By modifying antivirus databases
πŸ”˜ C) By injecting malware into the recycle bin
πŸ”˜ D) By encrypting registry keys

βœ… Answer: A) By exploiting in-memory execution without leaving files on disk
πŸ“ Explanation: Fileless malware operates entirely in memory, making it harder to detect using traditional antivirus tools.


128. How does “living off the land” malware operate?

πŸ”˜ A) By abusing legitimate system tools (e.g., PowerShell) to execute malicious actions
πŸ”˜ B) By modifying environmental variables to hide payloads
πŸ”˜ C) By injecting malware inside system registry keys
πŸ”˜ D) By using cloud storage as an attack vector

βœ… Answer: A) By abusing legitimate system tools (e.g., PowerShell) to execute malicious actions
πŸ“ Explanation: Living off the land (LotL) attacks use built-in tools like PowerShell and WMI to execute malware without dropping files.


129. How do attackers use compromised GitHub repositories to distribute malware?

πŸ”˜ A) By uploading infected code disguised as open-source projects
πŸ”˜ B) By modifying README files to redirect users to malicious sites
πŸ”˜ C) By injecting malware into pull requests
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers upload trojanized repositories, modify documentation, and push malicious commits to spread malware.


130. What is “homoglyph phishing” in malware distribution?

πŸ”˜ A) Using visually similar domain names to trick users into downloading malware
πŸ”˜ B) Encrypting malware in Unicode characters
πŸ”˜ C) Injecting malware into font files
πŸ”˜ D) Using special symbols to bypass email filters

βœ… Answer: A) Using visually similar domain names to trick users into downloading malware
πŸ“ Explanation: Attackers register lookalike domain names (e.g., “g00gle.com”) to trick users into downloading malware.


131. How does “DLL sideloading” help malware evade detection?

πŸ”˜ A) By placing malicious DLL files where trusted programs load them
πŸ”˜ B) By encrypting DLL files before execution
πŸ”˜ C) By modifying system startup scripts
πŸ”˜ D) By injecting malware into web browsers

βœ… Answer: A) By placing malicious DLL files where trusted programs load them
πŸ“ Explanation: DLL sideloading tricks legitimate applications into loading and executing malicious DLL files.


132. How do hackers spread malware using free VPN services?

πŸ”˜ A) By injecting ads that lead to malware-infected sites
πŸ”˜ B) By modifying VPN traffic to distribute malicious payloads
πŸ”˜ C) By stealing user data and selling it on the dark web
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Some free VPNs inject malicious ads, steal data, and even deliver malware.


133. How do attackers use “clipboard hijacking” to steal cryptocurrency?

πŸ”˜ A) By replacing copied wallet addresses with attacker-controlled addresses
πŸ”˜ B) By modifying cryptocurrency exchange rates
πŸ”˜ C) By injecting JavaScript into trading platforms
πŸ”˜ D) By monitoring Wi-Fi networks for crypto transactions

βœ… Answer: A) By replacing copied wallet addresses with attacker-controlled addresses
πŸ“ Explanation: Clipboard hijackers detect crypto wallet addresses and swap them with attacker-controlled addresses.


134. How does malware spread through fake AI-powered tools?

πŸ”˜ A) By tricking users into installing AI-generated “enhancement” software
πŸ”˜ B) By modifying neural network algorithms
πŸ”˜ C) By injecting malware into AI-generated images
πŸ”˜ D) By using AI-powered chatbots to force downloads

βœ… Answer: A) By tricking users into installing AI-generated “enhancement” software
πŸ“ Explanation: Attackers disguise malware as AI-powered productivity tools, tricking users into downloading them.


135. How does malware use “invisible iframe injections” to infect users?

πŸ”˜ A) By embedding hidden iframes that load malicious content in the background
πŸ”˜ B) By displaying fake alerts that trick users into clicking them
πŸ”˜ C) By modifying the user’s firewall settings
πŸ”˜ D) By embedding malware inside web cookies

βœ… Answer: A) By embedding hidden iframes that load malicious content in the background
πŸ“ Explanation: Invisible iframes silently load malware-hosting websites, infecting users without any interaction.


136. What is the main goal of “ransomcloud” attacks?

πŸ”˜ A) To encrypt files stored in cloud services and demand ransom
πŸ”˜ B) To steal cloud-based API keys
πŸ”˜ C) To hijack cloud admin accounts for botnet operations
πŸ”˜ D) To disable two-factor authentication on cloud services

βœ… Answer: A) To encrypt files stored in cloud services and demand ransom
πŸ“ Explanation: Ransomcloud attacks encrypt files in OneDrive, Google Drive, and other cloud storage platforms, demanding ransom payments.


137. How does malware hide inside online code repositories?

πŸ”˜ A) By embedding malicious scripts in open-source projects
πŸ”˜ B) By modifying commit histories to inject malicious code
πŸ”˜ C) By distributing infected dependency packages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers use infected repositories, poisoned dependencies, and modified commit logs to distribute malware through GitHub and open-source projects.


138. How do attackers use “fake resume emails” to spread malware?

πŸ”˜ A) By attaching infected Word documents with macro-based malware
πŸ”˜ B) By sending phishing links to fake job applications
πŸ”˜ C) By exploiting recruitment platforms to host malware
πŸ”˜ D) By injecting malware inside email headers

βœ… Answer: A) By attaching infected Word documents with macro-based malware
πŸ“ Explanation: Fake job resumes often contain malicious macros that execute malware when the document is opened.


139. What is the purpose of a “browser-in-the-browser” phishing attack?

πŸ”˜ A) To create fake login pop-ups that steal credentials
πŸ”˜ B) To execute ransomware through JavaScript
πŸ”˜ C) To hijack the browser’s update mechanism
πŸ”˜ D) To disable browser security plugins

βœ… Answer: A) To create fake login pop-ups that steal credentials
πŸ“ Explanation: Browser-in-the-browser (BitB) phishing tricks users into entering credentials into a fake login window inside a website.


140. How does malware spread via “malicious Chrome extensions”?

πŸ”˜ A) By injecting malicious scripts into web pages
πŸ”˜ B) By logging keystrokes from web forms
πŸ”˜ C) By redirecting searches to malicious websites
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious Chrome extensions can inject scripts, log keystrokes, and redirect searches to malware-infected pages.


141. How does “typosquatting” help attackers distribute malware?

πŸ”˜ A) By registering misspelled domain names of popular websites to trick users
πŸ”˜ B) By injecting typos into software code to trigger exploits
πŸ”˜ C) By modifying search results to promote malware-infected sites
πŸ”˜ D) By creating fake file names that look like legitimate ones

βœ… Answer: A) By registering misspelled domain names of popular websites to trick users
πŸ“ Explanation: Typosquatting involves registering similar-looking domains (e.g., “facbook.com”) to distribute malware.


142. How do attackers use “malicious website pop-ups” to spread malware?

πŸ”˜ A) By displaying fake security warnings that trick users into downloading malware
πŸ”˜ B) By using JavaScript to force auto-downloads
πŸ”˜ C) By embedding exploit kits inside pop-up windows
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious pop-ups display fake alerts, trigger auto-downloads, and inject exploits into browsers.


143. How do attackers spread malware using USB charging stations (Juice Jacking)?

πŸ”˜ A) By installing malware onto a device when it is plugged into a compromised charging station
πŸ”˜ B) By modifying USB ports to send malicious commands
πŸ”˜ C) By infecting only Apple devices through USB-C connections
πŸ”˜ D) By encrypting device storage through the charging port

βœ… Answer: A) By installing malware onto a device when it is plugged into a compromised charging station
πŸ“ Explanation: Juice jacking infects devices when they are plugged into compromised public USB charging stations.


144. How does “rogue AI chatbots” help in malware delivery?

πŸ”˜ A) By sending malicious links disguised as helpful responses
πŸ”˜ B) By exploiting AI-driven voice assistants to download malware
πŸ”˜ C) By using machine learning to spread malware faster
πŸ”˜ D) By encrypting chatbot messages with hidden payloads

βœ… Answer: A) By sending malicious links disguised as helpful responses
πŸ“ Explanation: Malicious AI chatbots provide infected links disguised as legitimate advice.


145. How do attackers use “malicious torrent files” to spread malware?

πŸ”˜ A) By embedding malware in pirated software and movies
πŸ”˜ B) By modifying torrent tracker metadata
πŸ”˜ C) By injecting exploits into video subtitles
πŸ”˜ D) By distributing fake seeders with malware payloads

βœ… Answer: A) By embedding malware in pirated software and movies
πŸ“ Explanation: Many torrent files contain infected keygens, trojans, or ransomware hidden inside pirated content.


146. What is the role of “rogue browser updates” in malware infections?

πŸ”˜ A) They trick users into downloading fake updates containing malware
πŸ”˜ B) They modify the browser’s security settings remotely
πŸ”˜ C) They inject malware into cache files
πŸ”˜ D) They automatically redirect users to exploit kits

βœ… Answer: A) They trick users into downloading fake updates containing malware
πŸ“ Explanation: Fake browser update alerts convince users to download malware disguised as security updates.


147. How do attackers use “malicious NFT airdrops” to distribute malware?

πŸ”˜ A) By sending NFT links that install wallet-stealing malware
πŸ”˜ B) By encrypting NFT metadata with ransomware
πŸ”˜ C) By using NFTs to trigger cryptocurrency mining scripts
πŸ”˜ D) By injecting malware into NFT blockchain transactions

βœ… Answer: A) By sending NFT links that install wallet-stealing malware
πŸ“ Explanation: Malicious NFT airdrops lure victims into downloading infected wallet apps.


148. What is “watering hole malware” in cyberattacks?

πŸ”˜ A) Malware that targets websites frequently visited by a specific group
πŸ”˜ B) Malware that spreads through watermarked images
πŸ”˜ C) Malware that modifies DNS records in public Wi-Fi
πŸ”˜ D) Malware that infects data stored in cloud backups

βœ… Answer: A) Malware that targets websites frequently visited by a specific group
πŸ“ Explanation: Watering hole attacks infect trusted websites, targeting specific organizations or industries.


149. How do attackers use “malicious mobile app permissions” to install malware?

πŸ”˜ A) By requesting excessive permissions to access sensitive data
πŸ”˜ B) By modifying app settings in the background
πŸ”˜ C) By changing security policies remotely
πŸ”˜ D) By forcing users to enable administrative rights

βœ… Answer: A) By requesting excessive permissions to access sensitive data
πŸ“ Explanation: Malicious apps request unnecessary permissions (e.g., SMS access, camera control) to steal data or install malware.


150. How does malware use “exploit chains” to gain access to a system?

πŸ”˜ A) By combining multiple vulnerabilities to bypass security defenses
πŸ”˜ B) By using brute force attacks to crack system passwords
πŸ”˜ C) By modifying file attributes to evade detection
πŸ”˜ D) By exploiting cloud services to inject malware

βœ… Answer: A) By combining multiple vulnerabilities to bypass security defenses
πŸ“ Explanation: Exploit chains involve using multiple linked vulnerabilities to escalate privileges and bypass security.


151. How do attackers distribute malware through software supply chain attacks?

πŸ”˜ A) By injecting malicious code into software updates or dependencies
πŸ”˜ B) By exploiting hardware vulnerabilities in supply chains
πŸ”˜ C) By distributing malware through counterfeit software packages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Supply chain attacks inject malware into legitimate software updates, hardware, and dependencies.


152. What is the primary risk of downloading cracked or pirated software?

πŸ”˜ A) It often contains embedded malware such as trojans or keyloggers
πŸ”˜ B) It consumes more storage space than official software
πŸ”˜ C) It slows down internet speed significantly
πŸ”˜ D) It prevents access to official documentation

βœ… Answer: A) It often contains embedded malware such as trojans or keyloggers
πŸ“ Explanation: Cracked software is a common method of malware delivery, often containing ransomware, trojans, and spyware.


153. How does malware spread through online quizzes and personality tests?

πŸ”˜ A) By harvesting personal data to craft targeted phishing attacks
πŸ”˜ B) By embedding malicious JavaScript in quiz results pages
πŸ”˜ C) By forcing users to install browser extensions for quiz completion
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Online quizzes are used to collect personal data, deliver malicious scripts, and spread malware.


154. How do cybercriminals use “malicious macros” in Microsoft Office documents?

πŸ”˜ A) By embedding VBA scripts that execute malware when the document is opened
πŸ”˜ B) By modifying Office settings to disable security alerts
πŸ”˜ C) By forcing users to enable developer mode
πŸ”˜ D) By encrypting the document header to bypass detection

βœ… Answer: A) By embedding VBA scripts that execute malware when the document is opened
πŸ“ Explanation: Malicious macros in Word, Excel, and PowerPoint files execute malware when macros are enabled.


155. How does malware spread through malicious browser cookies?

πŸ”˜ A) By storing session hijacking scripts inside cookies
πŸ”˜ B) By modifying browser cache settings
πŸ”˜ C) By injecting payloads into HTTP headers
πŸ”˜ D) By encrypting cookie data with a malware key

βœ… Answer: A) By storing session hijacking scripts inside cookies
πŸ“ Explanation: Malicious cookies can contain session hijacking scripts that steal authentication tokens.


156. What is a key method of malware delivery using “fake browser plugins”?

πŸ”˜ A) By injecting malicious JavaScript into web pages
πŸ”˜ B) By redirecting users to phishing websites
πŸ”˜ C) By logging keystrokes and stealing credentials
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake browser extensions can steal credentials, inject scripts, and hijack browser sessions.


157. How does malware propagate through fake CAPTCHA verification pages?

πŸ”˜ A) By making users unknowingly approve malicious browser notifications
πŸ”˜ B) By logging keystrokes when users enter the CAPTCHA
πŸ”˜ C) By injecting malware into encrypted CAPTCHA responses
πŸ”˜ D) By redirecting users to harmless sites while malware runs in the background

βœ… Answer: A) By making users unknowingly approve malicious browser notifications
πŸ“ Explanation: Fake CAPTCHA pop-ups trick users into allowing malware-laced browser notifications.


158. How do attackers distribute malware via “fake refund scam emails”?

πŸ”˜ A) By tricking victims into opening malicious attachments
πŸ”˜ B) By embedding malware inside fake payment links
πŸ”˜ C) By redirecting users to credential-stealing pages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake refund emails use attachments, links, and phishing pages to distribute malware.


159. How does malware spread via fake Adobe Flash Player updates?

πŸ”˜ A) By tricking users into downloading trojanized update files
πŸ”˜ B) By modifying legitimate Flash Player settings
πŸ”˜ C) By embedding exploits in official Flash files
πŸ”˜ D) By targeting browser compatibility settings

βœ… Answer: A) By tricking users into downloading trojanized update files
πŸ“ Explanation: Fake Flash Player updates are a common way to spread malware disguised as software updates.


160. How does malware use “voice assistant hijacking” to spread?

πŸ”˜ A) By injecting commands into voice-controlled devices
πŸ”˜ B) By modifying audio settings to force malware execution
πŸ”˜ C) By using ultrasonic sound waves to trigger malware scripts
πŸ”˜ D) By creating fake AI-generated voice commands

βœ… Answer: C) By using ultrasonic sound waves to trigger malware scripts
πŸ“ Explanation: Attackers exploit ultrasonic commands to control voice assistants remotely and trigger malware execution.


161. How does malware propagate through “malicious PDF watermarks”?

πŸ”˜ A) By embedding hidden scripts in the watermark layer of the document
πŸ”˜ B) By modifying PDF permissions to allow automatic execution
πŸ”˜ C) By encrypting hidden commands within metadata fields
πŸ”˜ D) By replacing text with malware-encoded characters

βœ… Answer: A) By embedding hidden scripts in the watermark layer of the document
πŸ“ Explanation: Malicious PDFs can contain exploitable scripts hidden within watermark layers.


162. How does malware spread using “rogue mobile security apps”?

πŸ”˜ A) By posing as antivirus apps that secretly install malware
πŸ”˜ B) By disabling built-in security features on smartphones
πŸ”˜ C) By modifying app permissions to gain full access
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake security apps often disable real security, modify permissions, and install malware.


163. How do cybercriminals use Google Forms for malware delivery?

πŸ”˜ A) By tricking users into entering sensitive data on fake forms
πŸ”˜ B) By embedding malicious scripts in form responses
πŸ”˜ C) By hiding malware links in the form submission confirmation page
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers embed malicious scripts, phishing links, and malware downloads inside Google Forms.


164. How do attackers use “malicious Windows shortcut files (.LNK)” to deliver malware?

πŸ”˜ A) By embedding commands that execute hidden payloads
πŸ”˜ B) By modifying Windows registry startup settings
πŸ”˜ C) By disguising as legitimate shortcuts to system tools
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious .LNK files execute hidden commands, modify registry settings, and disguise themselves as legitimate files.


165. What is “clickless malware” and how does it spread?

πŸ”˜ A) Malware that infects devices without requiring any user interaction
πŸ”˜ B) Malware that spreads by clicking links in phishing emails
πŸ”˜ C) Malware that modifies Windows event logs
πŸ”˜ D) Malware that requires admin privileges to install

βœ… Answer: A) Malware that infects devices without requiring any user interaction
πŸ“ Explanation: Clickless malware exploits vulnerabilities to infect systems without any clicks or downloads.


166. How do cybercriminals distribute malware using fake job application portals?

πŸ”˜ A) By embedding malware in downloadable “resume templates”
πŸ”˜ B) By redirecting users to phishing login pages
πŸ”˜ C) By forcing users to install a “job application plugin”
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake job portals trick users into downloading malware-infected templates, phishing login credentials, and installing malicious plugins.


167. How does malware spread through malicious PowerPoint presentations?

πŸ”˜ A) By executing embedded VBA macros upon opening
πŸ”˜ B) By hiding malicious payloads in slide transitions
πŸ”˜ C) By using PowerPoint Object Linking and Embedding (OLE) to execute scripts
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers use VBA macros, OLE objects, and transition triggers to execute malware inside PowerPoint presentations.


168. What is a common way attackers use “rogue QR codes” to distribute malware?

πŸ”˜ A) By linking users to malicious sites that auto-download malware
πŸ”˜ B) By encoding malware scripts directly inside the QR code
πŸ”˜ C) By modifying legitimate QR codes on advertisements
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious QR codes redirect users to infected sites, inject scripts, or replace real QR codes in public places.


169. How do attackers spread malware via “rogue online courses”?

πŸ”˜ A) By embedding malware in downloadable study materials
πŸ”˜ B) By sending phishing emails with fake enrollment links
πŸ”˜ C) By hosting fake learning portals that steal credentials
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake online courses distribute malware through infected PDFs, phishing links, and credential-stealing portals.


170. How do hackers use “fake speed test websites” to deliver malware?

πŸ”˜ A) By embedding malware scripts inside speed test results
πŸ”˜ B) By forcing users to download “speed booster” applications
πŸ”˜ C) By redirecting users to exploit kits
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake internet speed test websites inject malware scripts, force downloads, or exploit browser vulnerabilities.


171. What is a major risk of downloading “modded” (modified) mobile apps?

πŸ”˜ A) They often contain trojans or spyware
πŸ”˜ B) They run faster than original apps
πŸ”˜ C) They automatically uninstall after use
πŸ”˜ D) They only work on rooted devices

βœ… Answer: A) They often contain trojans or spyware
πŸ“ Explanation: Modded apps are unofficial versions of legitimate apps, often injected with spyware, adware, or trojans.


172. How do cybercriminals use “malicious AI-generated images” for malware delivery?

πŸ”˜ A) By embedding malware payloads inside the metadata of AI-generated images
πŸ”˜ B) By using AI to generate deepfake scam campaigns
πŸ”˜ C) By using steganography to hide malware in the image pixels
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers use AI-generated images with hidden payloads, deepfake scams, and steganography-based malware delivery.


173. How does “rogue MFA (Multi-Factor Authentication) apps” spread malware?

πŸ”˜ A) By mimicking real MFA apps but secretly stealing login credentials
πŸ”˜ B) By injecting malicious scripts into real authentication processes
πŸ”˜ C) By disabling real MFA settings on user accounts
πŸ”˜ D) By forcing biometric verification before malware execution

βœ… Answer: A) By mimicking real MFA apps but secretly stealing login credentials
πŸ“ Explanation: Fake MFA apps trick users into entering credentials, then send login information to attackers.


174. How does malware use “document templates” to infect victims?

πŸ”˜ A) By embedding malicious macros inside official-looking templates
πŸ”˜ B) By modifying metadata to trigger script execution
πŸ”˜ C) By automatically executing payloads when the template is opened
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malware-infected document templates contain hidden macros, metadata exploits, and auto-executing scripts.


175. How does malware propagate through “cloud storage syncing”?

πŸ”˜ A) By infecting one file that syncs across multiple devices
πŸ”˜ B) By hiding malware inside shared folders
πŸ”˜ C) By modifying cloud permissions to allow automatic execution
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Cloud malware spreads by syncing infected files, hiding in shared folders, and exploiting misconfigured permissions.


176. How do attackers distribute malware through fake “security alert emails”?

πŸ”˜ A) By tricking users into clicking phishing links
πŸ”˜ B) By embedding malware in fake “urgent update” attachments
πŸ”˜ C) By redirecting users to credential-stealing login pages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers send fake security alerts with malicious links, infected attachments, and fake login pages.


177. How do cybercriminals spread malware through “fake resume-building websites”?

πŸ”˜ A) By forcing users to download “resume templates” that contain malware
πŸ”˜ B) By requiring users to enter credentials for “free downloads”
πŸ”˜ C) By injecting JavaScript exploits into the website itself
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake resume-building websites spread malware via infected downloads, credential theft, and site exploits.


178. How do cybercriminals spread malware through “fake online giveaways”?

πŸ”˜ A) By requiring victims to download “entry verification” files
πŸ”˜ B) By embedding malware in confirmation emails
πŸ”˜ C) By injecting malicious tracking cookies
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake giveaways are used to trick users into downloading malware or stealing personal data.


179. How do attackers distribute malware through “fake VPN services”?

πŸ”˜ A) By offering free VPNs that secretly log user data and install malware
πŸ”˜ B) By modifying network traffic to inject exploits
πŸ”˜ C) By encrypting malicious payloads inside VPN tunnels
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Many fake VPN services log user data, modify traffic, and deliver stealth malware infections.


180. How does malware spread using “fake Windows activation tools”?

πŸ”˜ A) By tricking users into downloading keygens that contain trojans
πŸ”˜ B) By modifying system registry keys to allow backdoor access
πŸ”˜ C) By installing hidden remote access trojans (RATs)
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake Windows activators often contain RATs, trojans, and registry modifications to maintain persistence.


181. How do cybercriminals use “rogue software cracks” to distribute malware?

πŸ”˜ A) By embedding trojans inside keygens and patchers
πŸ”˜ B) By modifying system files to allow persistent malware execution
πŸ”˜ C) By tricking users into disabling antivirus software before installation
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Many pirated software cracks contain trojans, keyloggers, or remote access malware, often requiring users to disable security software.


182. How do hackers use “malicious Spotify playlists” to spread malware?

πŸ”˜ A) By embedding malware-laced links in playlist descriptions
πŸ”˜ B) By forcing users to download a “high-quality audio codec”
πŸ”˜ C) By using fake Spotify accounts to send phishing messages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers distribute malware through fake playlist descriptions, phishing links, and fraudulent “audio enhancement” downloads.


183. How does malware spread through “malicious Instagram ads”?

πŸ”˜ A) By redirecting users to malware-infected sites through fake promotions
πŸ”˜ B) By injecting spyware into influencer-sponsored content
πŸ”˜ C) By tricking users into downloading fake “exclusive content” files
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious Instagram ads promote fake giveaways, trojanized downloads, and phishing pages.


184. How do attackers use “voice cloning” to assist in malware distribution?

πŸ”˜ A) By impersonating trusted individuals to convince victims to install malware
πŸ”˜ B) By modifying VoIP signals to inject malicious commands
πŸ”˜ C) By embedding malware in voice message files
πŸ”˜ D) By using AI-generated voices to bypass biometric authentication

βœ… Answer: A) By impersonating trusted individuals to convince victims to install malware
πŸ“ Explanation: AI-powered voice cloning allows cybercriminals to impersonate trusted figures and trick victims into installing malware.


185. How do cybercriminals spread malware through “malicious discount coupon sites”?

πŸ”˜ A) By redirecting users to exploit kits after clicking fake discount links
πŸ”˜ B) By requiring users to install a browser extension for discounts
πŸ”˜ C) By embedding trojans in downloadable “coupon generator” tools
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers create fake discount sites and coupon tools that steal credentials, inject malware, or force unwanted installations.


186. How do hackers use “malicious LinkedIn job offers” to distribute malware?

πŸ”˜ A) By sending phishing links disguised as job application portals
πŸ”˜ B) By attaching infected PDFs or Word documents as job descriptions
πŸ”˜ C) By embedding malware in LinkedIn direct messages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake LinkedIn job offers are used to spread phishing links, deliver malware via attachments, and steal credentials.


187. How do attackers distribute malware through “fake online tax filing services”?

πŸ”˜ A) By requiring users to download a “tax calculator” that contains malware
πŸ”˜ B) By stealing personal and financial information through fake tax websites
πŸ”˜ C) By embedding spyware in tax refund phishing emails
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake tax filing services trick users into downloading malware, submitting personal data, and executing spyware scripts.


188. How do attackers use “malicious mobile themes” to spread malware?

πŸ”˜ A) By embedding trojans in downloadable phone themes and icon packs
πŸ”˜ B) By modifying system settings to allow malware persistence
πŸ”˜ C) By using dynamic wallpaper engines to inject malicious scripts
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious mobile themes can install spyware, alter system settings, and execute trojanized scripts.


189. How does malware spread through “fake browser-based games”?

πŸ”˜ A) By tricking users into installing a “game launcher” that contains malware
πŸ”˜ B) By embedding malicious JavaScript inside the game’s source code
πŸ”˜ C) By using fake in-game rewards that require malicious app downloads
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake browser games are used to inject malware via game launchers, scripts, and trojanized app downloads.


190. How do cybercriminals use “fake online banking alerts” to distribute malware?

πŸ”˜ A) By sending phishing emails with malicious login links
πŸ”˜ B) By embedding trojans in fake “urgent security update” apps
πŸ”˜ C) By tricking users into downloading “banking verification tools”
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake banking alerts use phishing emails, trojanized updates, and malicious downloads to infect victims.


191. How do attackers spread malware using “pirated digital design software”?

πŸ”˜ A) By injecting trojans inside cracked versions of Photoshop and Illustrator
πŸ”˜ B) By embedding keyloggers in downloadable design templates
πŸ”˜ C) By tricking users into disabling antivirus software before installation
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Many pirated design software versions contain hidden trojans, keyloggers, and remote access malware.


192. How does malware spread through “malicious 3D printing files”?

πŸ”˜ A) By embedding malware payloads inside .STL and .OBJ files
πŸ”˜ B) By modifying G-code instructions to execute malicious scripts
πŸ”˜ C) By tricking users into downloading fake “3D model optimizers”
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious 3D files can execute scripts, modify printer behavior, and spread malware.


193. How do cybercriminals distribute malware through “fake AI chatbots”?

πŸ”˜ A) By embedding malicious links in chatbot-generated responses
πŸ”˜ B) By forcing users to install AI-powered browser extensions
πŸ”˜ C) By hijacking chatbot sessions to inject phishing messages
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious AI chatbots spread malware via infected links, trojanized browser extensions, and session hijacking.


194. How do attackers use “malicious Wi-Fi SSIDs” for malware distribution?

πŸ”˜ A) By tricking users into connecting to rogue Wi-Fi networks that inject malware
πŸ”˜ B) By embedding exploits into SSID names that execute on vulnerable devices
πŸ”˜ C) By using Wi-Fi packet sniffing to modify legitimate software downloads
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious Wi-Fi networks exploit SSID-based vulnerabilities, intercept downloads, and inject malware.


195. How does malware spread through “fake crowdfunding campaigns”?

πŸ”˜ A) By tricking donors into downloading trojanized receipt files
πŸ”˜ B) By embedding malware in campaign updates and emails
πŸ”˜ C) By using fake charities to collect sensitive financial data
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake crowdfunding scams distribute malware via infected receipts, phishing emails, and fraudulent donation pages.


196. How do attackers use “malicious browser push notifications” to distribute malware?

πŸ”˜ A) By tricking users into enabling notifications that lead to phishing or malware sites
πŸ”˜ B) By injecting malicious scripts into browser pop-ups
πŸ”˜ C) By modifying browser permissions remotely
πŸ”˜ D) By forcing users to install browser extensions

βœ… Answer: A) By tricking users into enabling notifications that lead to phishing or malware sites
πŸ“ Explanation: Fake browser notifications appear as system alerts and redirect users to malware-infected websites.


197. How does malware spread through “malicious cloud-based collaboration tools”?

πŸ”˜ A) By embedding malware in shared documents and spreadsheets
πŸ”˜ B) By exploiting misconfigured file-sharing permissions
πŸ”˜ C) By injecting malicious macros into cloud-synced files
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers target Google Drive, Dropbox, and Microsoft OneDrive by embedding malicious scripts, macros, and sharing exploits.


198. How do attackers use “malicious GitHub repositories” to spread malware?

πŸ”˜ A) By uploading infected code disguised as open-source projects
πŸ”˜ B) By injecting malicious scripts into dependencies
πŸ”˜ C) By modifying README files to contain phishing links
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious GitHub repositories contain infected open-source code, compromised dependencies, and misleading documentation.


199. How does malware spread through “fake voice messaging apps”?

πŸ”˜ A) By embedding spyware in the app that records private conversations
πŸ”˜ B) By requiring excessive app permissions to access SMS and contacts
πŸ”˜ C) By sending fake voice messages that contain malicious payloads
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious voice messaging apps steal user data, record conversations, and send fake voice messages with malware.


200. How do attackers distribute malware using “fake cryptocurrency wallets”?

πŸ”˜ A) By offering trojanized wallet apps that steal private keys
πŸ”˜ B) By redirecting transactions to attacker-controlled addresses
πŸ”˜ C) By embedding spyware that tracks user activity
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake crypto wallets steal wallet credentials, hijack transactions, and spy on user activity.


201. How does malware spread through “compromised browser bookmarks”?

πŸ”˜ A) By modifying stored bookmarks to redirect users to phishing sites
πŸ”˜ B) By injecting malicious scripts when bookmarked pages are opened
πŸ”˜ C) By using cloud-synced bookmarks to infect multiple devices
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malware can alter browser bookmarks to redirect users, inject scripts, and sync malicious links across devices.


202. How do attackers spread malware through “malicious MP3 or MP4 files”?

πŸ”˜ A) By embedding malware inside media file metadata
πŸ”˜ B) By exploiting vulnerabilities in media players to execute code
πŸ”˜ C) By hiding malicious payloads inside subtitle files
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Attackers embed malware in media files, exploit player vulnerabilities, and use infected subtitle files to execute code.


203. How do cybercriminals use “malicious LinkedIn learning courses” to distribute malware?

πŸ”˜ A) By embedding malware in course material downloads
πŸ”˜ B) By redirecting users to phishing login pages
πŸ”˜ C) By injecting scripts into fake educational platforms
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake LinkedIn learning courses trick users into downloading malware, entering credentials, or visiting infected sites.


204. How does malware spread through “fake mobile system updates”?

πŸ”˜ A) By tricking users into downloading malware disguised as an OS update
πŸ”˜ B) By modifying system files to allow persistent backdoors
πŸ”˜ C) By disabling security features before malware execution
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Fake system updates convince users to install trojanized firmware, disable security, and allow backdoor access.


205. How do attackers use “malicious Steam Workshop mods” to distribute malware?

πŸ”˜ A) By embedding malware inside game modification files
πŸ”˜ B) By tricking users into installing fake “enhanced graphics packs”
πŸ”˜ C) By injecting exploits into game scripts
πŸ”˜ D) All of the above

βœ… Answer: D) All of the above
πŸ“ Explanation: Malicious game mods distribute trojans, keyloggers, and remote execution exploits via Steam Workshop.