#1
Which of the following is an example of a strong password?
password123
P@ssw0rd!
12345678
qwerty
#2
What does the 'S' stand for in HTTPS?
#3
What does the acronym 'DDoS' stand for?
Distributed Denial of Security
Data Disruption over Systems
Distributed Denial of Service
Dynamic Data of Systems
#4
Which of the following is NOT a common social engineering technique?
Phishing
Shoulder surfing
Firewall bypassing
Tailgating
#5
What is the purpose of a firewall in cybersecurity?
To protect against physical intrusions
To prevent unauthorized access to or from a private network
To encrypt communication between devices
To scan for malware on a computer
#6
Which of the following is a common type of malware?
#7
What is the purpose of multi-factor authentication?
To require multiple passwords
To verify user identity with multiple credentials
To slow down the login process
To bypass security measures
#8
What is the main objective of a VPN (Virtual Private Network)?
To increase internet speed
To hide browsing history
To provide a secure connection over a public network
To block access to certain websites
#9
What does 'BYOD' stand for in the context of cybersecurity?
Bring Your Own Device
Backup Your Online Data
Breach Your Organization's Defenses
Block Your Online Downloads
#10
What is the primary purpose of an Intrusion Detection System (IDS)?
To prevent all types of cyber attacks
To monitor and detect malicious activities or policy violations
To filter all incoming network traffic
To encrypt sensitive data
#11
What is the term for software that appears legitimate but performs malicious actions?
Adware
Trojan Horse
Firewall
Phishing
#12
What is the purpose of encryption in cybersecurity?
To slow down network traffic
To hide the presence of malware
To protect data from unauthorized access
To block access to certain websites
#13
What is the purpose of penetration testing?
To fix bugs in software
To simulate cyber attacks to identify vulnerabilities
To monitor network traffic
To enhance user experience
#14
What is the role of a Security Operations Center (SOC) in cybersecurity?
To manage software updates
To oversee physical security measures
To monitor and analyze security incidents in real-time
To develop cybersecurity policies
#15
What is a common method for securing sensitive data in transit over the internet?
Using plaintext
Implementing a VPN
Disabling firewalls
Sharing passwords openly
#16
What is the purpose of a security policy?
To enforce compliance with government regulations
To restrict employee access to the internet
To outline guidelines and procedures for maintaining security
To increase network speed
#17
What is the term for a security mechanism that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Antivirus software
Firewall
Intrusion Detection System (IDS)
Encryption