Skip to content

MCQs with Answers on “Cyber Warfare: The Emerging Frontier in Defense Technology”

1. What is cyber warfare?

A. Use of social media for public outreach
B. Use of technology to disrupt enemy’s computer systems and networks
C. Legal warfare in cyberspace
D. Hacking for personal financial gain
Answer: B


2. Which of the following is a common tool used in cyber warfare?

A. Torpedoes
B. Ransomware
C. Fighter jets
D. Tanks
Answer: B


3. The term “zero-day vulnerability” refers to:

A. A day without cyberattacks
B. A software vulnerability unknown to the developer
C. A virus with a one-day activation time
D. A government-sanctioned cyberattack
Answer: B


4. Stuxnet, a famous cyber weapon, targeted which country’s nuclear facilities?

A. North Korea
B. Iran
C. Russia
D. China
Answer: B


5. The process of defending against cyberattacks is called:

A. Cybersecurity
B. Cyber infiltration
C. Cyber disarmament
D. Cyber espionage
Answer: A


6. What is the primary goal of cyber warfare?

A. Create digital art
B. Disrupt, damage, or gain control of enemy systems
C. Develop new software
D. Conduct market research
Answer: B


7. Which organization is primarily responsible for cybersecurity in the United States?

A. NASA
B. FBI
C. NSA
D. Federal Reserve
Answer: C


8. A Distributed Denial of Service (DDoS) attack primarily aims to:

A. Destroy physical infrastructure
B. Overwhelm network resources
C. Steal personal information
D. Monitor communication channels
Answer: B


9. The 2018 cyberattack on SingHealth in Singapore compromised data of how many individuals?

A. 1 million
B. 1.5 million
C. 2 million
D. 500,000
Answer: B


10. Cyber warfare is considered part of which generation of warfare?

A. Second-generation warfare
B. Third-generation warfare
C. Fourth-generation warfare
D. Fifth-generation warfare
Answer: D


11. Which treaty governs the use of cyber tools in armed conflict?

A. Geneva Conventions
B. Tallinn Manual
C. Paris Agreement
D. Kyoto Protocol
Answer: B


12. The term “cyber resilience” refers to:

A. The ability to recover quickly from cyberattacks
B. The ability to prevent cyberattacks
C. The capability to build cyber weapons
D. The process of creating backup systems
Answer: A


13. The WannaCry ransomware attack primarily targeted:

A. Government networks
B. Healthcare systems
C. Banking infrastructure
D. Retail companies
Answer: B


14. Which country is often accused of employing “patriotic hackers” for cyber warfare?

A. Germany
B. China
C. India
D. Australia
Answer: B


15. The term “cyber espionage” refers to:

A. Gathering intelligence through cyber means
B. Creating cyber defense systems
C. Disabling enemy networks
D. Developing secure software
Answer: A


16. Which of these is an example of a cyber defense measure?

A. Phishing
B. Firewalls
C. Malware injection
D. DDoS attacks
Answer: B


17. “Botnets” are used in cyber warfare to:

A. Create websites
B. Generate software codes
C. Launch coordinated cyberattacks
D. Analyze market trends
Answer: C


18. Which international organization focuses on cybercrime and cybersecurity?

A. WTO
B. Interpol
C. UNESCO
D. WHO
Answer: B


19. Cyberattacks on power grids can be classified as:

A. Financial espionage
B. Infrastructure sabotage
C. Intellectual property theft
D. Cyber marketing
Answer: B


20. Which country launched the “NotPetya” cyberattack?

A. North Korea
B. Russia
C. Iran
D. United States
Answer: B


21. What does the term “phishing” mean?

A. Catching fish using the internet
B. Fraudulently acquiring sensitive information by impersonation
C. Searching for vulnerabilities in software
D. Monitoring online traffic
Answer: B


22. The strategy of preemptively launching cyberattacks is called:

A. Cyber espionage
B. Cyber deterrence
C. Active cyber defense
D. Passive cyber defense
Answer: C


23. The term “APT” in cyber warfare stands for:

A. Advanced Persistent Threat
B. Automated Processing Technology
C. Artificial Programming Tool
D. Attack Prevention Technique
Answer: A


24. Cyber warfare is part of which broader concept?

A. Space warfare
B. Information warfare
C. Conventional warfare
D. Urban warfare
Answer: B


25. The primary focus of NATO’s Cyber Defense Center of Excellence is:

A. Designing cyber weapons
B. Promoting international cyber peace
C. Enhancing cybersecurity capabilities among member states
D. Training hackers
Answer: C


26. Which malware was used in the 2007 cyberattack on Estonia?

A. Trojan Horse
B. DDoS bots
C. Ransomware
D. Worms
Answer: B


27. The concept of “cyber deterrence” is analogous to:

A. Nuclear disarmament
B. Conventional warfare strategies
C. Economic sanctions
D. Diplomatic negotiations
Answer: A


28. Which of the following is a key principle of cybersecurity?

A. Confidentiality, Integrity, Availability
B. Accuracy, Privacy, Monitoring
C. Encryption, Access, Transparency
D. Automation, Precision, Scalability
Answer: A


29. Cybersecurity frameworks like ISO 27001 focus on:

A. Offensive cyber techniques
B. Enhancing IT infrastructure efficiency
C. Information security management systems
D. Developing new malware detection tools
Answer: C


30. Which nation proposed the “Paris Call for Trust and Security in Cyberspace”?

A. United States
B. France
C. United Kingdom
D. Canada
Answer: B

Cart
Back To Top
error: Content is protected !!