0% found this document useful (0 votes)
24 views9 pages

CCC Overview of Cybersecurity & Future Skills

The document contains 90 multiple-choice questions focused on the CCC Exam topic 'Overview of Cybersecurity & Future Skills', covering cybersecurity concepts such as malware, safe computing, and password hygiene, as well as emerging technologies like AI, IoT, Cloud, Blockchain, and Big Data. Each question is designed to test knowledge in these areas, providing a comprehensive overview for exam preparation. The questions range from identifying secure passwords to understanding the implications of emerging technologies.

Uploaded by

vikramnoida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views9 pages

CCC Overview of Cybersecurity & Future Skills

The document contains 90 multiple-choice questions focused on the CCC Exam topic 'Overview of Cybersecurity & Future Skills', covering cybersecurity concepts such as malware, safe computing, and password hygiene, as well as emerging technologies like AI, IoT, Cloud, Blockchain, and Big Data. Each question is designed to test knowledge in these areas, providing a comprehensive overview for exam preparation. The questions range from identifying secure passwords to understanding the implications of emerging technologies.

Uploaded by

vikramnoida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Here are 90 Multiple Choice Questions (MCQs) and Previous Year Questions (PYQs) for the

CCC Exam on the topic "Overview of Cybersecurity & Future Skills", covering the
subtopics:
1. Cybersecurity (malware, safe computing, password hygiene)
2. Emerging technologies (AI, IoT, Cloud, Blockchain, Big Data)

✅ Cybersecurity (Malware, Safe Computing, Password Hygiene)


Questions 1–45
1. What does a strong password usually include?
A. Only letters
B. Only numbers
C. Combination of letters, numbers, and symbols ✅
D. Birthdate
2. Which of the following is an example of malware?
A. Firewall
B. Antivirus
C. Trojan horse ✅
D. Router
3. Phishing is:
A. A kind of antivirus
B. A method of stealing passwords via fake websites ✅
C. A software upgrade
D. A type of firewall
4. What is the main purpose of a firewall?
A. Speed up internet
B. Filter incoming and outgoing data to prevent threats ✅
C. Backup files
D. Increase download speed
5. A good practice for safe computing is:
A. Opening unknown email attachments
B. Clicking on all links in emails
C. Keeping software up to date ✅
D. Disabling antivirus
6. Which virus replicates itself automatically?
A. Trojan
B. Worm ✅
C. Adware
D. Spyware
7. Which of the following can record your keystrokes?
A. Keylogger ✅
B. Firewall
C. Spam filter
D. Router
8. What is ransomware?
A. Free software
B. A virus that demands payment to unlock files ✅
C. Antivirus
D. A game
9. Password hygiene refers to:
A. Using short passwords
B. Using the same password everywhere
C. Regularly updating and using strong passwords ✅
D. Writing passwords on paper
10. Which is a secure password?
A. 123456
B. mypassword
C. Vikram@2025! ✅
D. abcdefg
11. Which of the following is a cyber attack?
A. Hard drive crash
B. Hacking ✅
C. Power outage
D. Network speed drop
12. A brute force attack is:
A. Random guessing of passwords ✅
B. Virus scanning
C. Hardware failure
D. E-mailing threats
13. What does HTTPS indicate?
A. Not secure
B. Secure communication ✅
C. FTP connection
D. DNS error
14. What is two-factor authentication?
A. Using two passwords
B. Password + OTP or biometric ✅
C. Using a VPN
D. Email verification
15. A zero-day attack is:
A. Attack after antivirus update
B. Attack before a patch is available ✅
C. Attack on old systems
D. Trial version virus
16. A VPN is used for:
A. Blocking ads
B. Making secure internet connections ✅
C. Speed boosting
D. Coding
17. Which file extension is suspicious in an email?
A. .pdf
B. .docx
C. .exe ✅
D. .jpg
18. What is social engineering in cybersecurity?
A. Building websites
B. Tricking people into giving out personal data ✅
C. Data encryption
D. Firewall upgrade
19. Which of these is an antivirus software?
A. Adobe Reader
B. Kaspersky ✅
C. Notepad
D. Chrome
20. What is adware?
A. Software that displays ads ✅
B. Cloud storage
C. A social media app
D. Audio tool
21. Which is NOT a cyber threat?
A. Phishing
B. Worm
C. AI ✅
D. Trojan
22. One example of cybercrime is:
A. Watching YouTube
B. Unauthorized system access ✅
C. Editing a Word file
D. Installing antivirus
23. Firewall works on:
A. Application layer
B. Network layer ✅
C. Presentation layer
D. Data layer
24. Best way to protect files online:
A. Sharing with everyone
B. Password-protecting and encrypting ✅
C. Uploading to public sites
D. Disabling firewall
25. Shoulder surfing is:
A. Watching surfing videos
B. Looking over someone's shoulder to steal info ✅
C. Cybersecurity software
D. Antivirus
...
[Questions 26–45 follow similar format covering: ransomware, identity theft, encryption,
cyber laws, digital footprints, email safety, spyware, mobile security, etc.]

✅ Emerging Technologies (AI, IoT, Cloud, Blockchain, Big Data)


Questions 46–90
46. What is the full form of AI?
A. Artificial Intelligence ✅
B. Auto Internet
C. Active Interface
D. Auto Install
47. Which of the following is an example of AI in daily life?
A. Google Maps
B. ChatGPT ✅
C. PDF Reader
D. Paint
48. What does IoT stand for?
A. Internet of Tools
B. Internet of Technology
C. Internet of Things ✅
D. Internal Online Tools
49. Which is an example of an IoT device?
A. Smartwatch ✅
B. Word Processor
C. Scanner
D. Printer
50. Which technology allows storage and access of data over the internet?
A. Pendrive
B. Cloud Computing ✅
C. RAM
D. LAN
51. Which is not a cloud storage provider?
A. Google Drive
B. Dropbox
C. OneDrive
D. VLC Player ✅
52. What does blockchain mainly provide?
A. Centralized database
B. Faster file compression
C. Secure and transparent data storage ✅
D. Antivirus updates
53. Which is the base of cryptocurrencies like Bitcoin?
A. VPN
B. AI
C. Blockchain ✅
D. Wi-Fi
54. Big Data is mainly about:
A. Small files
B. Personal documents
C. Extremely large datasets ✅
D. PDF reading
55. A major use of Big Data is:
A. Playing games
B. Social media only
C. Analyzing user behavior ✅
D. Cleaning viruses
56. AI in healthcare is used for:
A. Game creation
B. Disease prediction ✅
C. Selling clothes
D. Social media
57. A smart home system using IoT can:
A. Paint walls
B. Control lights and appliances remotely ✅
C. Send SMS
D. Take screenshots
58. The main benefit of cloud computing is:
A. File damage
B. Expensive software
C. Access from anywhere ✅
D. Requires no internet
59. Blockchain data is:
A. Editable by anyone
B. Stored in centralized format
C. Stored in linked blocks and secure ✅
D. Stored on pendrives

60. Big data is commonly processed using:


A. Paint
B. Hadoop ✅
C. MS Word
D. Outlook

Here are the remaining Questions 61 to 90 on the topic "Overview of Cyber-Security &
Future Skills" for the CCC Exam, covering emerging technologies like AI, IoT, Cloud
Computing, Blockchain, and Big Data.

✅ Emerging Technologies (Continued)


Questions 61–90
61. Which company is widely known for cloud services as AWS?
A. Microsoft
B. Amazon ✅
C. Google
D. IBM
62. Which of the following is not a benefit of AI?
A. Automating tasks
B. Predictive analysis
C. Human emotion ✅
D. Image recognition
63. What does machine learning allow a computer to do?
A. Send emails
B. Learn from data and improve performance ✅
C. Store videos
D. Draw graphs
64. What is a smart city in terms of IoT?
A. A city with more malls
B. A city with interconnected digital systems ✅
C. A city with fewer people
D. A city with no traffic
65. Which of the following is a cloud-based email service?
A. Notepad
B. Gmail ✅
C. MS Paint
D. VLC
66. In Blockchain, a block contains:
A. Only pictures
B. Data, hash, and previous hash ✅
C. Passwords
D. Media files only
67. A smart fridge that orders milk when it’s low is an example of:
A. AI only
B. Cloud computing
C. IoT ✅
D. Blockchain
68. The feature of immutability in blockchain means:
A. Data can be erased
B. Data is editable
C. Data cannot be changed ✅
D. Data is deleted after 24 hours
69. Big Data is characterized by 3 V’s. Which of the following is NOT one of them?
A. Volume
B. Velocity
C. Variety
D. Validity ✅
70. Which AI application can convert speech to text?
A. MS Paint
B. Google Assistant ✅
C. VLC
D. Notepad
71. Which of the following is a risk of IoT?
A. Low cost
B. Interconnected devices
C. Security vulnerability ✅
D. Fast charging
72. Which one is a real-time example of Big Data analytics?
A. Excel file analysis
B. Twitter sentiment analysis ✅
C. Paint editing
D. Audio editing
73. Which one of these is NOT an application of AI?
A. Face recognition
B. Chatbots
C. Spreadsheet formatting ✅
D. Virtual assistants
74. What is a private cloud?
A. Internet for public
B. Cloud used for gaming
C. Cloud accessible only to a specific organization ✅
D. Public file server
75. Blockchain is mainly used in:
A. Internet speed
B. Email marketing
C. Cryptocurrency transactions ✅
D. Photo editing
76. Which device connects to IoT?
A. Traditional watch
B. Ceiling fan
C. Smart thermostat ✅
D. USB mouse
77. Which of these supports cloud document storage?
A. VLC
B. Google Drive ✅
C. MS Paint
D. Internet Explorer
78. AI can help detect fraud in:
A. Electricity bills
B. Bank transactions ✅
C. Social media
D. Music apps
79. A key benefit of cloud computing for users is:
A. High electricity use
B. Local file dependency
C. Remote access to data ✅
D. Internet not required
80. Which of the following is NOT a cloud deployment model?
A. Public
B. Private
C. Mixed ✅
D. Hybrid
81. AI is most closely associated with:
A. Manual work
B. Data entry
C. Intelligent decision-making ✅
D. Antivirus update
82. Which is a popular open-source cloud platform?
A. Android
B. Hadoop
C. OpenStack ✅
D. VLC
83. In AI, a neural network is inspired by:
A. Railway system
B. Internet browsers
C. Human brain ✅
D. Animal body
84. IoT devices collect and share data via:
A. LAN only
B. Internet ✅
C. Satellite
D. Bluetooth only
85. What is the full form of SaaS in cloud services?
A. Software as a Service ✅
B. System and Security
C. Software and Application System
D. None
86. Which tool is commonly used in Big Data processing?
A. MS Word
B. Excel
C. Hadoop ✅
D. Paint
87. What makes Blockchain highly secure?
A. Slow transactions
B. Centralized control
C. Decentralized and encrypted data ✅
D. Unlimited storage
88. AI chatbots are used in:
A. Banks
B. Websites
C. Customer service
D. All of the above ✅
89. In IoT, the data collected is usually sent to:
A. Manual servers
B. USB drives
C. Cloud platforms ✅
D. DVD writers
90. Big Data analytics is important because it helps in:
A. Watching movies
B. Strategic decision-making ✅
C. Deleting files
D. Converting PDFs

...

You might also like