#1
What is a common method to protect against phishing attacks?
Using strong passwords
Installing antivirus software
Verifying sender identity and URLs
Ignoring suspicious emails
#2
Which of the following is NOT a type of malware?
Trojan horse
Spyware
Firewall
Ransomware
#3
What is the purpose of encryption in cybersecurity?
To hide information from unauthorized users
To increase internet speed
To block access to websites
To detect malware
#4
Which of the following is a best practice for creating strong passwords?
Using common words
Using personal information
Using a combination of letters, numbers, and special characters
Using the same password for multiple accounts
#5
What is the main purpose of antivirus software?
To protect against physical intruders
To block unwanted emails
To detect and remove malicious software
To encrypt data transmissions
#6
What does the term 'social engineering' refer to in cybersecurity?
A type of software vulnerability
A technique used to manipulate people into divulging confidential information
A method of encrypting data
A form of network attack
#7
What does VPN stand for?
Virtual Private Network
Very Personal Network
Visual Proxy Node
Virtualized Processing Node
#8
What is the purpose of penetration testing?
To secure a network from hackers
To exploit vulnerabilities in a system
To simulate cyber attacks to identify weaknesses
To develop new security protocols
#9
What does the term 'phishing' refer to in cybersecurity?
A method used to catch hackers
A type of malware
An attempt to trick users into revealing sensitive information
A technique to encrypt data
#10
What is a firewall in the context of cybersecurity?
A physical barrier to prevent access to a network
A software or hardware-based security system that monitors and controls incoming and outgoing network traffic
A type of antivirus software
A tool used for encryption
#11
Which of the following is a common method to protect against malware?
Regularly updating software
Disabling firewalls
Clicking on unknown links
Sharing passwords with colleagues
#12
What is the role of a Security Information and Event Management (SIEM) system?
To block all incoming network traffic
To manage physical security devices
To collect and analyze security data from various sources
To create strong passwords
#13
What is a zero-day vulnerability?
A vulnerability that has been exploited for zero days
A vulnerability that has existed for zero days
A vulnerability that is unknown to the software developer
A vulnerability that is too new to be patched
#14
What is multi-factor authentication (MFA) used for in cybersecurity?
To secure physical locations
To authenticate users using multiple credentials
To prevent malware attacks
To monitor network traffic
#15
What is the purpose of a Distributed Denial of Service (DDoS) attack?
To gain unauthorized access to a system
To destroy data
To disrupt the normal functioning of a network
To encrypt files
#16
What is the main goal of a man-in-the-middle (MITM) attack?
To encrypt sensitive data
To steal user credentials
To intercept and alter communication between two parties
To exploit software vulnerabilities
#17
What is the purpose of a WAF (Web Application Firewall)?
To secure physical infrastructure
To detect and block attacks specifically targeted at web applications
To manage user access to web resources
To encrypt web traffic