#1
What is a firewall used for in cybersecurity?
Encrypting data
Blocking unauthorized access
Detecting viruses
Creating backups
#2
In the context of cybersecurity, what does the term 'SOC' stand for?
System on Chip
Security Operations Center
Secure Online Communication
Service-Oriented Computing
#3
In cybersecurity, what does the term 'sandboxing' refer to?
Testing software in a controlled environment
Blocking malicious websites
Creating virtual networks
Encrypting data at rest
#4
What does the term 'BYOD' stand for in the context of cybersecurity?
Bring Your Own Device
Block Your Online Data
Backup Your Operating Devices
Browser for Your Online Data
#5
Which security measure involves the use of a biometric characteristic for authentication?
Firewall
Two-Factor Authentication
Biometric Access Control
Encryption
#6
Which of the following is a common method of social engineering?
Denial-of-Service (DoS) attack
Phishing
SQL injection
Cross-site scripting (XSS)
#7
What does the term 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
Very Private Network
Visual Processing Node
Virus Protection Network
#8
What is the primary purpose of a honey pot in cybersecurity?
To store sensitive data
To attract and detect attackers
To encrypt network traffic
To optimize network speed
#9
Which type of malware disguises itself as legitimate software but carries out malicious activities?
Spyware
Adware
Trojan horse
Worm
#10
What is the primary role of an Intrusion Detection System (IDS) in cybersecurity?
Encrypting data transmissions
Monitoring and identifying suspicious activities
Generating cryptographic keys
Blocking network traffic
#11
What is the purpose of penetration testing in cybersecurity?
To design firewalls
To identify vulnerabilities
To create encryption algorithms
To monitor network traffic
#12
Which encryption algorithm is commonly used for securing internet communication, including online banking and email?
#13
What is the purpose of a security token in two-factor authentication?
To generate random passwords
To biometrically scan the user
To decrypt encrypted messages
To provide a physical key
#14
What is the purpose of a nonce in cryptographic protocols?
To prevent replay attacks
To encrypt messages
To authorize access
To generate public keys
#15
What does the term 'pharming' refer to in the context of cybersecurity?
Manipulating or corrupting data
Falsifying digital certificates
Redirecting users to fraudulent websites
Hijacking network traffic