#1
Which of the following is an example of a strong password?
password123
qwerty
P@ssw0rd!
123456
#2
What does the 'S' stand for in HTTPS?
Security
Server
Socket
Super
#3
What is the purpose of multi-factor authentication (MFA)?
To protect against data loss
To require two or more forms of verification before granting access
To encrypt files on a device
To automate software updates
#4
What is the purpose of encryption in cybersecurity?
To hide the user's identity
To protect data by converting it into a coded form
To speed up internet connection
To detect and remove malware
#5
What does the 'P' stand for in 'VPN'?
Private
Protocol
Public
Personal
#6
Which of the following is a method to prevent unauthorized access to a computer network or system?
Spyware
Antivirus software
Firewall
Adware
#7
Which of the following is a common phishing technique?
Installing antivirus software
Using complex passwords
Sending fake emails pretending to be from a legitimate source
Regularly updating software
#8
What does VPN stand for?
Virtual Private Network
Visual Personal Network
Verified Public Network
Virus Protection Network
#9
What is the primary purpose of a firewall in a network?
To block all incoming network traffic
To monitor outgoing emails
To prevent unauthorized access and control the flow of data
To enhance internet speed
#10
Which of the following is NOT a recommended method for securely disposing of sensitive data?
Physically shredding paper documents
Using data wiping software
Dragging files to the recycle bin and emptying it
Overwriting data multiple times
#11
Which of the following is NOT considered a common cybersecurity threat?
Phishing
Spyware
Firewall
Malware
#12
What is the term used to describe the practice of tricking individuals into revealing sensitive information such as passwords and credit card numbers?
Hacking
Spoofing
Phishing
Malware
#13
Which of the following is a type of malware that restricts access to a computer system and demands a ransom be paid to unlock it?
Trojan horse
Adware
Ransomware
Spyware
#14
Which of the following is NOT a common type of social engineering attack?
Phishing
Shoulder surfing
Man-in-the-middle
Spoofing
#15
What is the main goal of penetration testing?
To encrypt sensitive data
To simulate cyber attacks and identify vulnerabilities
To monitor network traffic
To block malicious websites