#1
What is a firewall used for in cybersecurity?
Blocking unauthorized access
ExplanationFirewall is used to block unauthorized access and protect networks from malicious activities.
#2
In the context of cybersecurity, what does the term 'SOC' stand for?
Security Operations Center
ExplanationSOC stands for Security Operations Center, a centralized unit for monitoring and responding to security incidents.
#3
In cybersecurity, what does the term 'sandboxing' refer to?
Testing software in a controlled environment
ExplanationSandboxing involves testing software in a controlled environment to identify and mitigate potential security risks.
#4
What does the term 'BYOD' stand for in the context of cybersecurity?
Bring Your Own Device
ExplanationBYOD stands for Bring Your Own Device, referring to the practice of employees using their personal devices for work purposes.
#5
Which security measure involves the use of a biometric characteristic for authentication?
Biometric Access Control
ExplanationBiometric Access Control involves using a person's unique biological features, such as fingerprints or facial recognition, for authentication in security systems.
#6
Which of the following is a common method of social engineering?
Phishing
ExplanationPhishing is a common social engineering method involving deceptive emails or messages to trick individuals into revealing sensitive information.
#7
What does the term 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
ExplanationVPN stands for Virtual Private Network, providing a secure and private connection over the internet.
#8
What is the primary purpose of a honey pot in cybersecurity?
To attract and detect attackers
ExplanationA honey pot is designed to attract and detect attackers, providing insights into their methods.
#9
Which type of malware disguises itself as legitimate software but carries out malicious activities?
Trojan horse
ExplanationA Trojan horse is malware that disguises itself as legitimate software while carrying out malicious activities.
#10
What is the primary role of an Intrusion Detection System (IDS) in cybersecurity?
Monitoring and identifying suspicious activities
ExplanationIDS monitors and identifies suspicious activities, providing early detection of potential security threats.
#11
What is the purpose of penetration testing in cybersecurity?
To identify vulnerabilities
ExplanationPenetration testing is conducted to identify and address vulnerabilities in a system or network.
#12
Which encryption algorithm is commonly used for securing internet communication, including online banking and email?
AES
ExplanationAES (Advanced Encryption Standard) is commonly used to secure internet communication, ensuring confidentiality.
#13
What is the purpose of a security token in two-factor authentication?
To generate random passwords
ExplanationA security token generates random passwords for two-factor authentication, enhancing security.
#14
What is the purpose of a nonce in cryptographic protocols?
To prevent replay attacks
ExplanationA nonce in cryptographic protocols helps prevent replay attacks by ensuring the uniqueness of data in each communication.
#15
What does the term 'pharming' refer to in the context of cybersecurity?
Redirecting users to fraudulent websites
ExplanationPharming involves redirecting users to fraudulent websites, often for malicious purposes.