#1
What does the acronym 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
Virus Protection Network
Verified Public Network
Virtual Processor Node
#2
Which of the following is NOT a type of malware?
Trojan Horse
Spyware
Router
Ransomware
#3
Which protocol is commonly used for secure communication over a computer network, particularly for web browsing?
#4
What is the term used to describe a security attack that overwhelms a system with excessive requests, rendering it unavailable to users?
DDoS (Distributed Denial of Service)
SQL Injection
Cross-Site Scripting (XSS)
Man-in-the-Middle (MitM) Attack
#5
What does the acronym 'SIEM' stand for in cybersecurity?
Security Information and Event Management
Systematic Incident and Event Monitoring
Secure Internet and Email Management
Systematic Intrusion and Exploit Mitigation
#6
What is the term used to describe the process of converting plaintext into unintelligible ciphertext?
Encryption
Decryption
Authentication
Authorization
#7
What is the purpose of biometric authentication?
To protect against unauthorized access using physical characteristics
To encrypt data during transmission
To detect malware infections
To create secure passwords
#8
What is the role of a firewall in cybersecurity?
To prevent unauthorized access to or from a private network
To encrypt data transmission
To recover lost data
To identify malware signatures
#9
What is the term used to describe the practice of tricking individuals into revealing sensitive information such as passwords or credit card numbers?
Phishing
Spoofing
Brute Force Attack
Denial of Service (DoS)
#10
Which of the following is NOT considered a best practice for creating secure passwords?
Using a combination of uppercase and lowercase letters
Using easily guessable passwords like 'password' or '123456'
Incorporating numbers and special characters
Avoiding common words or phrases
#11
What is the primary purpose of multi-factor authentication (MFA)?
To provide an additional layer of security by requiring multiple forms of identification
To encrypt data transmission
To detect phishing attempts
To protect against ransomware attacks
#12
Which of the following is NOT a common method to protect data in transit?
SSL/TLS encryption
Firewalls
VPN (Virtual Private Network)
SSH (Secure Shell)
#13
What does the term 'Social Engineering' refer to in the context of cybersecurity?
Manipulating individuals to divulge confidential information
Using advanced algorithms to break encryption
Gaining unauthorized access to a system by exploiting software vulnerabilities
Conducting security audits to identify weaknesses
#14
Which cryptographic technique uses a single key for both encryption and decryption?
Symmetric Encryption
Asymmetric Encryption
Hashing
Public Key Infrastructure (PKI)
#15
What does the term 'Zero-Day Exploit' refer to in cybersecurity?
A vulnerability that is exploited before the software creator is aware of it
An exploit that targets outdated software versions
A type of malware that spreads rapidly
A security patch released within a day of a vulnerability discovery
#16
Which of the following is a characteristic of a strong encryption algorithm?
It can be easily cracked with basic computing resources
It produces ciphertext that is identical to the plaintext
It is resistant to known cryptographic attacks
It requires the same key for encryption and decryption
#17
What is the purpose of a honeypot in cybersecurity?
To detect and observe attackers
To store sensitive data
To create a secure connection
To encrypt communication channels