#1
Which of the following is NOT a common cybersecurity threat?
Firewall
ExplanationFirewalls are actually a security measure.
#2
What does VPN stand for?
Virtual Private Network
ExplanationVPNs encrypt network traffic for security.
#3
Which of the following is a common social engineering technique?
Shoulder surfing
ExplanationShoulder surfing involves spying on passwords.
#4
What is the primary purpose of a security patch?
To fix security flaws in software
ExplanationPatches address software vulnerabilities.
#5
What is the term for a cybersecurity attack that involves manipulating individuals into performing actions or divulging confidential information?
Phishing
ExplanationPhishing exploits human vulnerabilities.
#6
Which of the following is an example of a strong password?
P@ssw0rd!
ExplanationIt includes a mix of characters and symbols.
#7
What is the purpose of encryption in cybersecurity?
To secure data by converting it into a code
ExplanationEncryption renders data unreadable without the proper key.
#8
What is the purpose of a phishing attack?
To trick individuals into revealing sensitive information
ExplanationPhishing aims to deceive for data theft.
#9
What is the main goal of a Denial of Service (DoS) attack?
To make a resource unavailable to users
ExplanationDoS attacks disrupt access to services.
#10
What is the primary reason for implementing multi-factor authentication (MFA)?
To provide an additional layer of security
ExplanationMFA enhances login security.
#11
What is the term used for a security mechanism that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
ExplanationFirewalls regulate network traffic.
#12
What is the purpose of a penetration test?
To simulate a cyberattack against a system to identify vulnerabilities
ExplanationPen tests evaluate system security.
#13
What is the purpose of a honeypot in cybersecurity?
To attract and trap potential attackers
ExplanationHoneypots lure and identify attackers.