#1
Which of the following is an example of a strong password?
P@ssw0rd!
ExplanationIncludes special characters, uppercase, lowercase, and numbers
#2
What does the 'S' stand for in HTTPS?
Security
ExplanationDenotes the protocol's secure nature
#3
What is the purpose of multi-factor authentication (MFA)?
To require two or more forms of verification before granting access
ExplanationEnhances security by adding layers of authentication
#4
What is the purpose of encryption in cybersecurity?
To protect data by converting it into a coded form
ExplanationSecures data from unauthorized access by encoding it
#5
What does the 'P' stand for in 'VPN'?
Private
ExplanationImplies restricted access and confidentiality
#6
Which of the following is a method to prevent unauthorized access to a computer network or system?
Firewall
ExplanationActs as a barrier between internal and external networks
#7
Which of the following is a common phishing technique?
Sending fake emails pretending to be from a legitimate source
ExplanationImpersonating trusted entities to trick users
#8
What does VPN stand for?
Virtual Private Network
ExplanationCreates a secure connection over a public network
#9
What is the primary purpose of a firewall in a network?
To prevent unauthorized access and control the flow of data
ExplanationActs as a barrier between trusted and untrusted networks
#10
Which of the following is NOT a recommended method for securely disposing of sensitive data?
Dragging files to the recycle bin and emptying it
ExplanationDoes not securely delete data, leaving it susceptible to recovery
#11
Which of the following is NOT considered a common cybersecurity threat?
Firewall
ExplanationFirewall is a security measure, not a threat
#12
What is the term used to describe the practice of tricking individuals into revealing sensitive information such as passwords and credit card numbers?
Phishing
ExplanationManipulating individuals to divulge confidential data
#13
Which of the following is a type of malware that restricts access to a computer system and demands a ransom be paid to unlock it?
Ransomware
ExplanationHolds data hostage for payment
#14
Which of the following is NOT a common type of social engineering attack?
Man-in-the-middle
ExplanationNot a direct manipulation of individuals, but interception of communication
#15
What is the main goal of penetration testing?
To simulate cyber attacks and identify vulnerabilities
ExplanationEvaluates system security by mimicking real-world attacks