Here are 90 Multiple Choice Questions (MCQs) and Previous Year Questions (PYQs) for the
CCC Exam on the topic "Overview of Cybersecurity & Future Skills", covering the
subtopics:
1. Cybersecurity (malware, safe computing, password hygiene)
2. Emerging technologies (AI, IoT, Cloud, Blockchain, Big Data)
✅ Cybersecurity (Malware, Safe Computing, Password Hygiene)
Questions 1–45
1. What does a strong password usually include?
A. Only letters
B. Only numbers
C. Combination of letters, numbers, and symbols ✅
D. Birthdate
2. Which of the following is an example of malware?
A. Firewall
B. Antivirus
C. Trojan horse ✅
D. Router
3. Phishing is:
A. A kind of antivirus
B. A method of stealing passwords via fake websites ✅
C. A software upgrade
D. A type of firewall
4. What is the main purpose of a firewall?
A. Speed up internet
B. Filter incoming and outgoing data to prevent threats ✅
C. Backup files
D. Increase download speed
5. A good practice for safe computing is:
A. Opening unknown email attachments
B. Clicking on all links in emails
C. Keeping software up to date ✅
D. Disabling antivirus
6. Which virus replicates itself automatically?
A. Trojan
B. Worm ✅
C. Adware
D. Spyware
7. Which of the following can record your keystrokes?
A. Keylogger ✅
B. Firewall
C. Spam filter
D. Router
8. What is ransomware?
A. Free software
B. A virus that demands payment to unlock files ✅
C. Antivirus
D. A game
9. Password hygiene refers to:
A. Using short passwords
B. Using the same password everywhere
C. Regularly updating and using strong passwords ✅
D. Writing passwords on paper
10. Which is a secure password?
A. 123456
B. mypassword
C. Vikram@2025! ✅
D. abcdefg
11. Which of the following is a cyber attack?
A. Hard drive crash
B. Hacking ✅
C. Power outage
D. Network speed drop
12. A brute force attack is:
A. Random guessing of passwords ✅
B. Virus scanning
C. Hardware failure
D. E-mailing threats
13. What does HTTPS indicate?
A. Not secure
B. Secure communication ✅
C. FTP connection
D. DNS error
14. What is two-factor authentication?
A. Using two passwords
B. Password + OTP or biometric ✅
C. Using a VPN
D. Email verification
15. A zero-day attack is:
A. Attack after antivirus update
B. Attack before a patch is available ✅
C. Attack on old systems
D. Trial version virus
16. A VPN is used for:
A. Blocking ads
B. Making secure internet connections ✅
C. Speed boosting
D. Coding
17. Which file extension is suspicious in an email?
A. .pdf
B. .docx
C. .exe ✅
D. .jpg
18. What is social engineering in cybersecurity?
A. Building websites
B. Tricking people into giving out personal data ✅
C. Data encryption
D. Firewall upgrade
19. Which of these is an antivirus software?
A. Adobe Reader
B. Kaspersky ✅
C. Notepad
D. Chrome
20. What is adware?
A. Software that displays ads ✅
B. Cloud storage
C. A social media app
D. Audio tool
21. Which is NOT a cyber threat?
A. Phishing
B. Worm
C. AI ✅
D. Trojan
22. One example of cybercrime is:
A. Watching YouTube
B. Unauthorized system access ✅
C. Editing a Word file
D. Installing antivirus
23. Firewall works on:
A. Application layer
B. Network layer ✅
C. Presentation layer
D. Data layer
24. Best way to protect files online:
A. Sharing with everyone
B. Password-protecting and encrypting ✅
C. Uploading to public sites
D. Disabling firewall
25. Shoulder surfing is:
A. Watching surfing videos
B. Looking over someone's shoulder to steal info ✅
C. Cybersecurity software
D. Antivirus
...
[Questions 26–45 follow similar format covering: ransomware, identity theft, encryption,
cyber laws, digital footprints, email safety, spyware, mobile security, etc.]
✅ Emerging Technologies (AI, IoT, Cloud, Blockchain, Big Data)
Questions 46–90
46. What is the full form of AI?
A. Artificial Intelligence ✅
B. Auto Internet
C. Active Interface
D. Auto Install
47. Which of the following is an example of AI in daily life?
A. Google Maps
B. ChatGPT ✅
C. PDF Reader
D. Paint
48. What does IoT stand for?
A. Internet of Tools
B. Internet of Technology
C. Internet of Things ✅
D. Internal Online Tools
49. Which is an example of an IoT device?
A. Smartwatch ✅
B. Word Processor
C. Scanner
D. Printer
50. Which technology allows storage and access of data over the internet?
A. Pendrive
B. Cloud Computing ✅
C. RAM
D. LAN
51. Which is not a cloud storage provider?
A. Google Drive
B. Dropbox
C. OneDrive
D. VLC Player ✅
52. What does blockchain mainly provide?
A. Centralized database
B. Faster file compression
C. Secure and transparent data storage ✅
D. Antivirus updates
53. Which is the base of cryptocurrencies like Bitcoin?
A. VPN
B. AI
C. Blockchain ✅
D. Wi-Fi
54. Big Data is mainly about:
A. Small files
B. Personal documents
C. Extremely large datasets ✅
D. PDF reading
55. A major use of Big Data is:
A. Playing games
B. Social media only
C. Analyzing user behavior ✅
D. Cleaning viruses
56. AI in healthcare is used for:
A. Game creation
B. Disease prediction ✅
C. Selling clothes
D. Social media
57. A smart home system using IoT can:
A. Paint walls
B. Control lights and appliances remotely ✅
C. Send SMS
D. Take screenshots
58. The main benefit of cloud computing is:
A. File damage
B. Expensive software
C. Access from anywhere ✅
D. Requires no internet
59. Blockchain data is:
A. Editable by anyone
B. Stored in centralized format
C. Stored in linked blocks and secure ✅
D. Stored on pendrives
60. Big data is commonly processed using:
A. Paint
B. Hadoop ✅
C. MS Word
D. Outlook
Here are the remaining Questions 61 to 90 on the topic "Overview of Cyber-Security &
Future Skills" for the CCC Exam, covering emerging technologies like AI, IoT, Cloud
Computing, Blockchain, and Big Data.
✅ Emerging Technologies (Continued)
Questions 61–90
61. Which company is widely known for cloud services as AWS?
A. Microsoft
B. Amazon ✅
C. Google
D. IBM
62. Which of the following is not a benefit of AI?
A. Automating tasks
B. Predictive analysis
C. Human emotion ✅
D. Image recognition
63. What does machine learning allow a computer to do?
A. Send emails
B. Learn from data and improve performance ✅
C. Store videos
D. Draw graphs
64. What is a smart city in terms of IoT?
A. A city with more malls
B. A city with interconnected digital systems ✅
C. A city with fewer people
D. A city with no traffic
65. Which of the following is a cloud-based email service?
A. Notepad
B. Gmail ✅
C. MS Paint
D. VLC
66. In Blockchain, a block contains:
A. Only pictures
B. Data, hash, and previous hash ✅
C. Passwords
D. Media files only
67. A smart fridge that orders milk when it’s low is an example of:
A. AI only
B. Cloud computing
C. IoT ✅
D. Blockchain
68. The feature of immutability in blockchain means:
A. Data can be erased
B. Data is editable
C. Data cannot be changed ✅
D. Data is deleted after 24 hours
69. Big Data is characterized by 3 V’s. Which of the following is NOT one of them?
A. Volume
B. Velocity
C. Variety
D. Validity ✅
70. Which AI application can convert speech to text?
A. MS Paint
B. Google Assistant ✅
C. VLC
D. Notepad
71. Which of the following is a risk of IoT?
A. Low cost
B. Interconnected devices
C. Security vulnerability ✅
D. Fast charging
72. Which one is a real-time example of Big Data analytics?
A. Excel file analysis
B. Twitter sentiment analysis ✅
C. Paint editing
D. Audio editing
73. Which one of these is NOT an application of AI?
A. Face recognition
B. Chatbots
C. Spreadsheet formatting ✅
D. Virtual assistants
74. What is a private cloud?
A. Internet for public
B. Cloud used for gaming
C. Cloud accessible only to a specific organization ✅
D. Public file server
75. Blockchain is mainly used in:
A. Internet speed
B. Email marketing
C. Cryptocurrency transactions ✅
D. Photo editing
76. Which device connects to IoT?
A. Traditional watch
B. Ceiling fan
C. Smart thermostat ✅
D. USB mouse
77. Which of these supports cloud document storage?
A. VLC
B. Google Drive ✅
C. MS Paint
D. Internet Explorer
78. AI can help detect fraud in:
A. Electricity bills
B. Bank transactions ✅
C. Social media
D. Music apps
79. A key benefit of cloud computing for users is:
A. High electricity use
B. Local file dependency
C. Remote access to data ✅
D. Internet not required
80. Which of the following is NOT a cloud deployment model?
A. Public
B. Private
C. Mixed ✅
D. Hybrid
81. AI is most closely associated with:
A. Manual work
B. Data entry
C. Intelligent decision-making ✅
D. Antivirus update
82. Which is a popular open-source cloud platform?
A. Android
B. Hadoop
C. OpenStack ✅
D. VLC
83. In AI, a neural network is inspired by:
A. Railway system
B. Internet browsers
C. Human brain ✅
D. Animal body
84. IoT devices collect and share data via:
A. LAN only
B. Internet ✅
C. Satellite
D. Bluetooth only
85. What is the full form of SaaS in cloud services?
A. Software as a Service ✅
B. System and Security
C. Software and Application System
D. None
86. Which tool is commonly used in Big Data processing?
A. MS Word
B. Excel
C. Hadoop ✅
D. Paint
87. What makes Blockchain highly secure?
A. Slow transactions
B. Centralized control
C. Decentralized and encrypted data ✅
D. Unlimited storage
88. AI chatbots are used in:
A. Banks
B. Websites
C. Customer service
D. All of the above ✅
89. In IoT, the data collected is usually sent to:
A. Manual servers
B. USB drives
C. Cloud platforms ✅
D. DVD writers
90. Big Data analytics is important because it helps in:
A. Watching movies
B. Strategic decision-making ✅
C. Deleting files
D. Converting PDFs
...