#1
Which of the following is an example of a strong password?
P@ssw0rd!
ExplanationIncludes special characters, uppercase, lowercase, and numbers
#2
What does the 'S' stand for in HTTPS?
Security
ExplanationDenotes the protocol's secure nature
#3
What is the purpose of multi-factor authentication (MFA)?
To require two or more forms of verification before granting access
ExplanationEnhances security by adding layers of authentication
#4
What is the purpose of encryption in cybersecurity?
To protect data by converting it into a coded form
ExplanationSecures data from unauthorized access by encoding it
#5
What does the 'P' stand for in 'VPN'?
Private
ExplanationImplies restricted access and confidentiality
#6
Which of the following is a method to prevent unauthorized access to a computer network or system?
Firewall
ExplanationActs as a barrier between internal and external networks
#7
What is the purpose of a security patch?
To fix security vulnerabilities
ExplanationAddresses weaknesses in software or systems
#8
Which of the following is a method of protecting sensitive information while it is being transmitted over a network?
Data encryption
ExplanationConverts data into an unreadable format during transmission
#9
What is the purpose of a security token?
To generate one-time passwords
ExplanationProvides dynamic authentication codes for secure access
#10
What is the main purpose of security awareness training?
To prevent cyber attacks by educating users about potential threats
ExplanationEmpowers individuals to recognize and respond to security threats
#11
Which of the following is a common phishing technique?
Sending fake emails pretending to be from a legitimate source
ExplanationImpersonating trusted entities to trick users
#12
What does VPN stand for?
Virtual Private Network
ExplanationCreates a secure connection over a public network
#13
What is the primary purpose of a firewall in a network?
To prevent unauthorized access and control the flow of data
ExplanationActs as a barrier between trusted and untrusted networks
#14
Which of the following is NOT a recommended method for securely disposing of sensitive data?
Dragging files to the recycle bin and emptying it
ExplanationDoes not securely delete data, leaving it susceptible to recovery
#15
Which of the following is NOT considered a common cybersecurity threat?
Firewall
ExplanationFirewall is a security measure, not a threat
#16
What is the term used to describe the practice of tricking individuals into revealing sensitive information such as passwords and credit card numbers?
Phishing
ExplanationManipulating individuals to divulge confidential data
#17
Which of the following is an example of biometric authentication?
Scanning a fingerprint
ExplanationVerifies identity based on unique biological characteristics
#18
What is the purpose of a security audit?
To identify and fix security vulnerabilities
ExplanationEvaluates the effectiveness of security measures
#19
What is the primary purpose of a cybersecurity incident response plan?
To outline steps to take in the event of a cyber security breach
ExplanationEstablishes procedures to mitigate damage from security incidents
#20
What is the purpose of a VPN kill switch?
To block all internet traffic if the VPN connection drops
ExplanationPrevents data leakage if VPN connection fails
#21
Which of the following is NOT a common authentication factor?
Something you share
ExplanationNot a common authentication method, as it's subjective and easily compromised
#22
Which of the following is a common security measure for protecting against malware?
Regularly updating software
ExplanationCloses security loopholes and patches vulnerabilities
#23
Which of the following is a type of malware that restricts access to a computer system and demands a ransom be paid to unlock it?
Ransomware
ExplanationHolds data hostage for payment
#24
Which of the following is NOT a common type of social engineering attack?
Man-in-the-middle
ExplanationNot a direct manipulation of individuals, but interception of communication
#25
What is the main goal of penetration testing?
To simulate cyber attacks and identify vulnerabilities
ExplanationEvaluates system security by mimicking real-world attacks