#1
What does the term 'Phishing' refer to in cybersecurity?
A method to steal sensitive information by posing as a trustworthy entity
ExplanationDeceptive technique to steal data via false identity.
#2
In the context of cybersecurity, what does the acronym 'DNS' stand for?
Domain Name System
ExplanationSystem that translates domain names to IP addresses.
#3
What does the term 'Endpoint Security' refer to in cybersecurity?
Securing individual devices like computers and mobile devices
ExplanationProtects individual devices from threats.
#4
In the context of cybersecurity, what does the term 'White Hat Hacker' refer to?
An ethical hacker who uses their skills to help organizations improve security
ExplanationEthical hackers who identify and fix security flaws.
#5
Which of the following is a common authentication factor in two-factor authentication (2FA)?
Biometric scan
ExplanationRequires biological traits for authentication.
#6
In cybersecurity, what does the term 'SOC analyst' stand for?
Security Operations Center analyst
ExplanationSecurity professional monitoring SOC.
#7
Which of the following is a common encryption algorithm used to secure communication over the internet?
RSA
ExplanationCommon encryption algorithm for secure communication.
#8
What is the primary purpose of a firewall in a cybersecurity context?
To monitor network traffic and control access based on predetermined security rules
ExplanationRegulates network traffic to enforce security policies.
#9
What is the purpose of a Virtual Private Network (VPN) in cybersecurity?
To establish a secure, encrypted connection over a public network
ExplanationCreates secure connections over public networks.
#10
Which programming language is commonly used for writing scripts in cybersecurity tasks?
Python
ExplanationPopular scripting language for cybersecurity tasks.
#11
What is the role of a security patch in the context of cybersecurity?
To update and fix known security flaws in software or systems
ExplanationAddresses known vulnerabilities in software.
#12
Which of the following is an example of a social engineering attack?
Phishing
ExplanationTricks users into divulging sensitive information.
#13
What is the primary purpose of a Security Operations Center (SOC) in cybersecurity?
To monitor and respond to security incidents in real-time
ExplanationCentral hub for security event monitoring and response.
#14
What is the role of an Intrusion Detection System (IDS) in cybersecurity?
To detect and alert on suspicious activities or potential security threats
ExplanationIdentifies and alerts on abnormal system behavior.
#15
Which of the following is an example of a multi-factor authentication method?
Fingerprint scan and smart card
ExplanationRequires multiple forms of verification for access.
#16
What is the term used to describe the practice of luring attackers into a trap to gather information about them?
Honeypot
ExplanationTechnique to gather intel by baiting attackers.
#17
What is the purpose of a Security Information and Event Management (SIEM) system?
To collect, analyze, and respond to security events in real-time
ExplanationCentralizes security event monitoring and management.
#18
What is the primary purpose of a penetration test in cybersecurity?
To simulate a cyberattack on a system and identify vulnerabilities
ExplanationSimulates attacks to uncover system weaknesses.
#19
What is a 'Zero-day exploit' in the realm of cybersecurity?
An attack exploiting a previously unknown software vulnerability
ExplanationExploits unknown vulnerabilities for attacks.
#20
What is the role of a WAF (Web Application Firewall) in cybersecurity?
To monitor and filter HTTP traffic between a web application and the internet
ExplanationProtects web apps by filtering incoming traffic.