#1
Which of the following is a common method of social engineering?
Phishing
ExplanationDeceptive attempt to acquire sensitive information by impersonating a trustworthy entity.
#2
What does the term 'DDoS' stand for in the context of cybersecurity?
Distributed Denial of Service
ExplanationOverloading a network or server with excessive traffic to disrupt access.
#3
What does the acronym 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
ExplanationSecurely extends a private network over a public network.
#4
What is the purpose of a 'firewall' in network security?
To detect and block unauthorized access attempts
ExplanationControls incoming and outgoing network traffic based on predefined security rules.
#5
What is the primary function of an antivirus software?
To detect and remove malware
ExplanationIdentifies and eliminates malicious software.
#6
What does the term 'phishing' refer to in the context of cybersecurity?
A method of social engineering to deceive individuals into revealing sensitive information
ExplanationTricking individuals into disclosing confidential data or credentials.
#7
Which of the following is NOT a type of malware?
Phishing
ExplanationPhishing is a form of social engineering, not a type of malware.
#8
What is the purpose of penetration testing?
To detect and fix vulnerabilities
ExplanationSimulated attacks to identify weaknesses in a system's security.
#9
What is the purpose of an Intrusion Detection System (IDS) in cybersecurity?
To monitor and analyze network traffic
ExplanationDetects and alerts for suspicious activity or policy violations.
#10
Which of the following is an example of a physical security control?
Biometric access control
ExplanationUses physiological traits for authentication and access control.
#11
What is the purpose of Two-Factor Authentication (2FA) in cybersecurity?
To provide an additional layer of security for user authentication
ExplanationRequires two forms of authentication for access.
#12
Which of the following is a best practice for securing passwords?
Using complex, unique passwords for each account
ExplanationIncreases password strength and reduces risk of compromise.
#13
What is the main goal of a 'honeypot' in cybersecurity?
To lure attackers into revealing their techniques
ExplanationDecoy system designed to attract and monitor unauthorized access.