#1
Which of the following is an example of a strong password?
P@ssw0rd!
ExplanationComplex combination of characters, symbols, and numbers.
#2
What does the 'S' stand for in HTTPS?
Secure
ExplanationIndicates a secure connection using encryption.
#3
What does the acronym 'DDoS' stand for?
Distributed Denial of Service
ExplanationOverwhelms a target with traffic, rendering it inaccessible.
#4
Which of the following is NOT a common social engineering technique?
Firewall bypassing
ExplanationNot a social engineering technique; it's a technical attack.
#5
What is the purpose of a firewall in cybersecurity?
To prevent unauthorized access to or from a private network
ExplanationFilters network traffic based on security rules to block threats.
#6
Which of the following is a common type of malware?
Spyware
ExplanationCollects information without user consent.
#7
What is the purpose of multi-factor authentication?
To verify user identity with multiple credentials
ExplanationEnhances security by requiring more than one form of authentication.
#8
What is the main objective of a VPN (Virtual Private Network)?
To provide a secure connection over a public network
ExplanationCreates a private network over a public one for secure communication.
#9
What does 'BYOD' stand for in the context of cybersecurity?
Bring Your Own Device
ExplanationPolicy allowing employees to use personal devices for work.
#10
What is the primary purpose of an Intrusion Detection System (IDS)?
To monitor and detect malicious activities or policy violations
ExplanationAlerts when unauthorized access or policy breaches occur.
#11
What is the term for software that appears legitimate but performs malicious actions?
Trojan Horse
ExplanationDeceives users into installing malicious software.
#12
What is the purpose of encryption in cybersecurity?
To protect data from unauthorized access
ExplanationConverts data into unreadable format to prevent unauthorized access.
#13
What is the purpose of penetration testing?
To simulate cyber attacks to identify vulnerabilities
ExplanationTests security defenses by mimicking real-world attacks.
#14
What is the role of a Security Operations Center (SOC) in cybersecurity?
To monitor and analyze security incidents in real-time
ExplanationCentralized hub for continuous security monitoring and response.
#15
What is a common method for securing sensitive data in transit over the internet?
Implementing a VPN
ExplanationEncrypts data to ensure secure transmission over public networks.
#16
What is the purpose of a security policy?
To outline guidelines and procedures for maintaining security
ExplanationEstablishes rules and procedures for safeguarding assets.
#17
What is the term for a security mechanism that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
ExplanationEnforces network security policies to prevent unauthorized access.