#1
Which of the following is a common method of social engineering?
Phishing
ExplanationDeceptive attempt to acquire sensitive information by impersonating a trustworthy entity.
#2
What does the term 'DDoS' stand for in the context of cybersecurity?
Distributed Denial of Service
ExplanationOverloading a network or server with excessive traffic to disrupt access.
#3
What does the acronym 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
ExplanationSecurely extends a private network over a public network.
#4
What is the purpose of a 'firewall' in network security?
To detect and block unauthorized access attempts
ExplanationControls incoming and outgoing network traffic based on predefined security rules.
#5
What is the primary function of an antivirus software?
To detect and remove malware
ExplanationIdentifies and eliminates malicious software.
#6
What does the term 'phishing' refer to in the context of cybersecurity?
A method of social engineering to deceive individuals into revealing sensitive information
ExplanationTricking individuals into disclosing confidential data or credentials.
#7
Which of the following is NOT a common cyber attack vector?
Firewalls
ExplanationFirewalls are protective measures, not attack vectors.
#8
Which of the following is a characteristic of a strong password?
Including a mix of letters, numbers, and special characters
ExplanationCombination of different characters increases complexity.
#9
What is the purpose of encryption in cybersecurity?
To protect data confidentiality by converting it into a secure format
ExplanationSecures data from unauthorized access by encoding it.
#10
What is the main goal of Security Awareness Training?
To educate users about cybersecurity risks and best practices
ExplanationEmpowers individuals to recognize and mitigate security threats.
#11
Which of the following is NOT a type of malware?
Phishing
ExplanationPhishing is a form of social engineering, not a type of malware.
#12
What is the purpose of penetration testing?
To detect and fix vulnerabilities
ExplanationSimulated attacks to identify weaknesses in a system's security.
#13
What is the purpose of an Intrusion Detection System (IDS) in cybersecurity?
To monitor and analyze network traffic
ExplanationDetects and alerts for suspicious activity or policy violations.
#14
Which of the following is an example of a physical security control?
Biometric access control
ExplanationUses physiological traits for authentication and access control.
#15
What is the purpose of Two-Factor Authentication (2FA) in cybersecurity?
To provide an additional layer of security for user authentication
ExplanationRequires two forms of authentication for access.
#16
Which of the following is a best practice for securing passwords?
Using complex, unique passwords for each account
ExplanationIncreases password strength and reduces risk of compromise.
#17
What is the purpose of Security Information and Event Management (SIEM) systems?
To monitor and analyze security events in real-time
ExplanationCentralizes logging and analysis of security-related data.
#18
What is the purpose of a vulnerability assessment in cybersecurity?
To detect and prioritize security weaknesses
ExplanationIdentifies and ranks vulnerabilities for mitigation.
#19
What is the primary function of a proxy server in network security?
To act as an intermediary between clients and servers
ExplanationEnhances privacy and security by routing traffic through an intermediary.
#20
What is the purpose of data backup in cybersecurity?
To ensure data availability and recovery in case of loss or corruption
ExplanationProtects against data loss by creating redundant copies.
#21
What is the role of a Security Operations Center (SOC) in cybersecurity?
To monitor and analyze security events and incidents
ExplanationCentralizes security monitoring and incident response.
#22
What is the purpose of a Digital Certificate in cybersecurity?
To authenticate the identity of a user or entity
ExplanationVerifies the legitimacy of digital entities.
#23
What is the purpose of a Security Information and Event Management (SIEM) system?
To monitor and analyze security events
ExplanationCentralizes logging and analysis of security-related data.
#24
What is the main goal of a 'honeypot' in cybersecurity?
To lure attackers into revealing their techniques
ExplanationDecoy system designed to attract and monitor unauthorized access.