CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
Using Password Managers
1. What is the primary purpose of a password manager?
a) To generate secure passwords
b) To store passwords securely and manage them
c) To automatically recover forgotten passwords
d) To share passwords with others securely
Answer: b
Explanation: A password manager securely stores and organizes passwords for different accounts,
allowing users to access them easily without needing to remember each one.
2. Which of the following is a key feature of a password manager?
a) It provides password recovery services
b) It encrypts passwords for secure storage
c) It automatically shares passwords with friends
d) It uses only weak encryption
Answer: b
Explanation: A password manager encrypts passwords to store them securely, making them less
vulnerable to unauthorized access.
3. How does a password manager help improve password security?
a) By generating weak passwords
b) By storing passwords in plain text
c) By generating strong, random passwords and keeping them encrypted
d) By storing passwords without encryption
Answer: c
Explanation: A password manager generates strong, random passwords and encrypts them, reducing
the risk of password theft or hacking.
4. What is the best practice for storing passwords in a password manager?
a) Store passwords for all websites under one master password
b) Use the same password for every website
c) Use a unique, strong master password for the password manager
d) Share the master password with others for easier access
Answer: c
Explanation: A strong, unique master password is crucial for securing the password manager, as it
is the key to accessing all stored passwords.
5. Which of the following should be avoided when using a password manager?
a) Enabling two-factor authentication for the password manager
b) Using a weak or easily guessable master password
c) Regularly updating stored passwords
d) Using the password manager on trusted devices
Answer: b
Explanation: Using a weak or easily guessable master password undermines the security of the
password manager. The master password must be strong and unique.
6. What is a "master password" in a password manager?
a) A password for each individual account stored in the manager
b) The main password used to access the password manager and its stored passwords
c) A backup password for recovering lost data
d) A password used to share stored passwords with others
Answer: b
Explanation: The master password is the main password that gives access to the entire password
vault in the password manager.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
7. Why should you enable two-factor authentication (2FA) on your password manager?
a) To avoid needing a master password
b) To make the password manager easier to use
c) To add an extra layer of security in case the master password is compromised
d) To reduce the complexity of the password manager
Answer: c
Explanation: Enabling 2FA on the password manager adds an extra layer of security, ensuring that
even if the master password is compromised, the account remains secure.
8. Which of the following is NOT a common feature of password managers?
a) Secure password storage b) Password generation
c) Password sharing d) Disabling password recovery
Answer: d
Explanation: Most password managers offer password recovery, either through master password
recovery options or customer support, making it easy to regain access.
9. What happens if you forget the master password for your password manager?
a) The password manager will automatically reset it
b) You can recover the passwords using a backup email
c) You may lose access to all stored passwords permanently
d) The password manager will unlock after a few attempts
Answer: c
Explanation: If you forget the master password, it is usually not recoverable, and you may lose
access to all stored passwords unless you have set up a recovery method in advance.
10. Can a password manager be used to store other sensitive data, such as credit card details?
a) No, it can only store passwords
b) Yes, most password managers also offer encrypted storage for sensitive data like credit cards
c) No, it is only for website login information
d) Yes, but only for usernames
Answer: b
Explanation: Most password managers offer secure storage for a wide range of sensitive data,
including credit card details, secure notes, and other private information.
Enabling Two-Step Verification (2FA)
11. What is Two-Step Verification (2FA)?
a) A process of using two passwords
b) A method that requires a password and an additional verification step
c) A process of encrypting passwords twice
d) A method of using one password for multiple accounts
Answer: b
Explanation: Two-Step Verification (2FA) requires two forms of verification before access is
granted, typically something you know (password) and something you have (phone, app, or token).
12. Which of the following is an example of a second factor in Two-Step Verification?
a) Password
b) Biometric data
c) Email address
d) Username
Answer: b
Explanation: Biometric data (e.g., fingerprints or facial recognition) is often used as the second
factor in Two-Step Verification.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
13. Why is Two-Step Verification more secure than just using a password?
a) It makes passwords longer
b) It requires two different forms of identification
c) It disables the need for passwords
d) It eliminates the need for encryption
Answer: b
Explanation: Two-Step Verification increases security by requiring two different forms of
authentication, making it harder for attackers to gain unauthorized access.
14. Which of the following methods is commonly used for Two-Step Verification?
a) Using only a password b) A one-time password (OTP) sent via email
c) Sharing your password with a friend d) Using the same password for all services
Answer: b
Explanation: One-time passwords (OTPs) sent via email or SMS are common methods of the
second factor in Two-Step Verification.
15. Which of the following is an example of an "Authenticator App" used for Two-Step
Verification?
a) WhatsApp b) Google Authenticator
c) Snapchat d) Skype
Answer: b
Explanation: Google Authenticator is a common app that generates one-time passcodes for Two-
Step Verification, which are required in addition to a password.
16. What is a key benefit of using an Authenticator App for Two-Step Verification instead of
SMS?
a) It works without an internet connection
b) It is easier to hack
c) It requires a permanent internet connection
d) It is more secure, as it is less vulnerable to interception
Answer: d
Explanation: Authenticator apps are more secure than SMS because they are less vulnerable to
interception and SIM-swapping attacks.
17. What happens if you lose your phone while using Two-Step Verification with an Authenticator
App?
a) You can no longer access your accounts
b) You can restore access by entering your password only
c) You can use a backup method, such as a recovery code or another 2FA method
d) You will need to re-enable Two-Step Verification
Answer: c
Explanation: Most services provide backup methods (like recovery codes or secondary verification
methods) in case the device used for Two-Step Verification is lost or inaccessible.
18. What is "SIM swapping," and how does it affect Two-Step Verification?
a) A method of transferring data between two phones
b) An attack where an attacker takes control of your phone number to intercept 2FA messages
c) A method of backing up Two-Step Verification
d) A security measure to protect your phone number
Answer: b
Explanation: SIM swapping is an attack where an attacker tricks a phone carrier into transferring
your phone number to their SIM card, allowing them to intercept OTPs for Two-Step Verification.
19. Which of the following is the most secure method of Two-Step Verification?
a) SMS-based 2FA b) Email-based 2FA
c) Biometric-based 2FA d) Password-based authentication
Answer: c
Explanation: Biometric-based Two-Step Verification (e.g., fingerprint, facial recognition) is
generally considered the most secure, as it is harder to replicate or intercept.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
20. What is a recovery code in Two-Step Verification?
a) A password reset link
b) A temporary code for re-enabling Two-Step Verification
c) A code to unlock your phone
d) A backup authentication method in case you lose access to your 2FA method
Answer: d
Explanation: A recovery code is a backup code provided when enabling Two-Step Verification,
used to regain access if the primary verification method is unavailable.
Additional Questions
21. How can enabling Two-Step Verification help prevent phishing attacks?
a) By making phishing attacks easier to carry out
b) By requiring attackers to bypass two separate security layers
c) By disabling email accounts
d) By making phishing links unclickable
Answer: b
Explanation: Two-Step Verification requires attackers to bypass two separate security layers, which
significantly reduces the chances of successful phishing attacks.
22. Why is it a security risk to use SMS for Two-Step Verification?
a) SMS is easy to intercept through attacks like SIM swapping
b) SMS never expires
c) SMS is not supported on all devices
d) SMS is slower than other methods
Answer: a
Explanation: SMS can be intercepted by attackers using methods like SIM swapping, making it less
secure for Two-Step Verification.
23. What is a security best practice for managing 2FA when switching devices?
a) Re-enable 2FA on the new device only
b) Delete old backup codes
c) Disable Two-Step Verification and use only passwords
d) Transfer all backup codes to the new device
Answer: a
Explanation: When switching devices, it is important to re-enable Two-Step Verification on the new
device to maintain security.
24. What is a time-based one-time password (TOTP)?
a) A password that never expires
b) A password that changes after a set amount of time
c) A permanent password for your accounts
d) A static password shared between devices
Answer: b
Explanation: TOTP is a dynamic, time-sensitive password that changes every 30 seconds, often
used in conjunction with apps like Google Authenticator for Two-Step Verification.
25. What is the role of an authentication server in Two-Step Verification?
a) It generates passwords
b) It stores user data
c) It validates the user’s password and the second factor
d) It sends email confirmations
Answer: c
Explanation: The authentication server is responsible for validating both the password and the
second factor in Two-Step Verification.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
26. How does Two-Step Verification help secure online banking?
a) It prevents unauthorized access to your bank accounts by adding an extra layer of security
b) It makes online banking transactions faster
c) It allows for easier access to funds
d) It removes the need for passwords in online banking
Answer: a
Explanation: Two-Step Verification helps secure online banking by requiring an additional layer of
authentication, reducing the chances of unauthorized access.
27. What is a "phishing-resistant" authentication method?
a) One that can easily be tricked into revealing the second factor
b) A method that relies on passwords only
c) A method that requires user input to authenticate
d) A method that makes it hard for attackers to intercept or spoof the second factor
Answer: d
Explanation: Phishing-resistant methods, like hardware tokens or biometrics, are difficult for
attackers to intercept or spoof, making them more secure.
28. What is the benefit of using hardware security keys for Two-Step Verification?
a) They are easy to lose
b) They require no internet connection
c) They are phishing-resistant and add extra security
d) They are cheaper than other 2FA methods
Answer: c
Explanation: Hardware security keys are considered one of the most secure methods for Two-Step
Verification, as they are resistant to phishing and other attacks.
29. Which type of accounts should always enable Two-Step Verification?
a) Only social media accounts
b) Only email accounts
c) High-value accounts, such as banking and email accounts
d) Only gaming accounts
Answer: c
Explanation: High-value accounts, especially those related to banking and email, should always
have Two-Step Verification enabled to ensure maximum security.
30. What is the most important thing to remember when enabling Two-Step Verification?
a) Only use SMS-based methods
b) Never share your backup codes or second factor
c) Use a weak password to make it easier to remember
d) Avoid using recovery options
Answer: b
Explanation: Backup codes and second factors should never be shared, as they provide critical
access to your account.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315