#1
What is the primary purpose of a firewall in computer security?
To detect and prevent unauthorized access
ExplanationNetwork traffic filtering and access control.
#2
What is the term used to describe the practice of tricking individuals into revealing sensitive information?
Phishing
ExplanationCommonly executed via fraudulent emails.
#3
Which of the following is NOT a common type of malware?
Firewall
ExplanationA security tool, not malicious software.
#4
What is the purpose of antivirus software in computer security?
To detect and remove malicious software
ExplanationScans for and eliminates malware infections.
#5
Which of the following is an example of a physical security measure?
Security guards
ExplanationHuman presence for facility protection.
#6
What is the term used to describe a program that appears legitimate but performs malicious activities in the background?
Trojan horse
ExplanationDeceptive software that harms systems.
#7
Which of the following authentication methods is the most secure?
Biometric authentication
ExplanationUses unique biological traits for identity verification.
#8
What does the acronym 'SSL' stand for in the context of computer security?
Secure Socket Layer
ExplanationSecures communication over the internet with encryption.
#9
Which encryption method uses two keys, one for encryption and one for decryption?
Asymmetric encryption
ExplanationAlso known as public-key encryption.
#10
What is the purpose of the 'least privilege principle' in permissions management?
To restrict users' access to only what they need
ExplanationReduces the potential impact of security breaches.
#11
What does 'ACL' stand for in the context of permissions management?
Access Control List
ExplanationDefines who can access what resources.
#12
Which security measure is designed to prevent unauthorized access to a wireless network?
WPA2 (Wi-Fi Protected Access 2)
ExplanationEnhances wireless network security.
#13
What is the purpose of a 'honeypot' in computer security?
To attract and distract attackers
ExplanationLures attackers away from valuable systems.