#1
What does the term 'phishing' refer to in the context of cybersecurity?
A fraudulent attempt to obtain sensitive information
ExplanationDeceptive method aiming to acquire confidential data through impersonation.
#2
What is the purpose of multi-factor authentication (MFA) in cybersecurity?
To authenticate users with more than one verification method
ExplanationEnhancing security by requiring multiple forms of identification for user authentication.
#3
What is a 'brute-force attack' in the context of cybersecurity?
A trial-and-error method to crack passwords
ExplanationAttempting to gain access by systematically trying all possible combinations.
#4
What is the purpose of a security token in cybersecurity?
To identify and authenticate users
ExplanationProviding a secure and unique identifier for user authentication and authorization.
#5
What is the purpose of a CAPTCHA in online security?
To identify and verify that the user is human
ExplanationEnsuring human interaction by requiring users to solve challenges that are difficult for automated programs.
#6
Which of the following is considered a strong password?
8#rP!2qZ
ExplanationA secure password with a mix of characters, numbers, and symbols for enhanced strength.
#7
What is the purpose of a firewall in network security?
To prevent unauthorized access and attacks
ExplanationSafeguarding networks by controlling incoming/outgoing traffic to block unauthorized entries.
#8
What is the role of a VPN (Virtual Private Network) in online security?
To secure and anonymize internet connections
ExplanationEnsuring secure and private online communication by encrypting internet connections.
#9
What is a common social engineering technique used by attackers?
Phishing
ExplanationTricking individuals into revealing sensitive information through deceptive online communication.
#10
Why is it essential to log out of online accounts when finished using them?
To prevent unauthorized access to the account
ExplanationReducing the risk of unauthorized access by terminating active sessions.
#11
What is the purpose of a biometric authentication system?
To recognize individuals based on unique biological traits
ExplanationVerifying identity through distinctive physical or behavioral characteristics.
#12
Why is it important to be cautious when clicking on email links or attachments?
To prevent phishing attacks
ExplanationAvoiding potential security threats and unauthorized access by being vigilant about email content.
#13
What is the primary goal of encryption in cybersecurity?
To prevent unauthorized access by converting data into a secure format
ExplanationSecuring information by converting it into an unreadable format that requires a key for decryption.
#14
What does the term 'zero-day vulnerability' mean in the context of cybersecurity?
A vulnerability that is exploited before the software vendor is aware
ExplanationSecurity weakness exploited by attackers before the software developer has a fix.
#15
What does the acronym 'SSL' stand for in the context of web security?
Secure Socket Layer
ExplanationProtocol ensuring secure data transmission over the internet by encrypting the connection.
#16
What is the significance of regularly updating software in cybersecurity?
To fix security vulnerabilities and bugs
ExplanationAddressing security flaws and software issues to maintain a robust cybersecurity posture.
#17
What is the difference between antivirus and anti-malware software?
Antivirus focuses on viruses, while anti-malware covers a broader range of malicious software
ExplanationAntivirus targets specific virus types, while anti-malware addresses various malicious software threats.
#18
What does the term 'two-factor authentication' mean?
A method combining a password with another form of verification
ExplanationEnhancing security by requiring two independent forms of identification for authentication.
#19
What is the purpose of a honeypot in cybersecurity?
To detect and analyze cyber threats
ExplanationLuring attackers to a decoy system to observe and analyze their tactics.