#1
What is a common method to protect against phishing attacks?
Verifying sender identity and URLs
ExplanationConfirming sender authenticity and web addresses
#2
Which of the following is NOT a type of malware?
Firewall
ExplanationFirewall is a security tool, not malware
#3
What is the purpose of encryption in cybersecurity?
To hide information from unauthorized users
ExplanationSecuring data from unauthorized access
#4
Which of the following is a best practice for creating strong passwords?
Using a combination of letters, numbers, and special characters
ExplanationComplex password composition
#5
What is the main purpose of antivirus software?
To detect and remove malicious software
ExplanationIdentifying and eliminating malware
#6
What does the term 'social engineering' refer to in cybersecurity?
A technique used to manipulate people into divulging confidential information
ExplanationManipulative tactics for information extraction
#7
What does VPN stand for?
Virtual Private Network
ExplanationEncrypted network connection over the internet
#8
What is the purpose of penetration testing?
To simulate cyber attacks to identify weaknesses
ExplanationTesting security defenses for vulnerabilities
#9
What does the term 'phishing' refer to in cybersecurity?
An attempt to trick users into revealing sensitive information
ExplanationDeceptive tactics for data theft
#10
What is a firewall in the context of cybersecurity?
A software or hardware-based security system that monitors and controls incoming and outgoing network traffic
ExplanationNetwork traffic control and monitoring tool
#11
Which of the following is a common method to protect against malware?
Regularly updating software
ExplanationFrequent software updates for security patches
#12
What is the role of a Security Information and Event Management (SIEM) system?
To collect and analyze security data from various sources
ExplanationCentralized security data monitoring and analysis
#13
What is a zero-day vulnerability?
A vulnerability that is unknown to the software developer
ExplanationUnpatched flaw exploited before discovery
#14
What is multi-factor authentication (MFA) used for in cybersecurity?
To authenticate users using multiple credentials
ExplanationEnhanced user verification through multiple factors
#15
What is the purpose of a Distributed Denial of Service (DDoS) attack?
To disrupt the normal functioning of a network
ExplanationOverwhelming network resources to halt operations
#16
What is the main goal of a man-in-the-middle (MITM) attack?
To intercept and alter communication between two parties
ExplanationIntercepting and manipulating data flow
#17
What is the purpose of a WAF (Web Application Firewall)?
To detect and block attacks specifically targeted at web applications
ExplanationSpecialized protection for web-based attacks