#1
What does the acronym 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
Virus Protection Network
Verified Public Network
Virtual Processor Node
#2
Which of the following is NOT a type of malware?
Trojan Horse
Spyware
Router
Ransomware
#3
Which protocol is commonly used for secure communication over a computer network, particularly for web browsing?
#4
What is the term used to describe a security attack that overwhelms a system with excessive requests, rendering it unavailable to users?
DDoS (Distributed Denial of Service)
SQL Injection
Cross-Site Scripting (XSS)
Man-in-the-Middle (MitM) Attack
#5
What does the acronym 'SIEM' stand for in cybersecurity?
Security Information and Event Management
Systematic Incident and Event Monitoring
Secure Internet and Email Management
Systematic Intrusion and Exploit Mitigation
#6
What is the term used to describe the process of converting plaintext into unintelligible ciphertext?
Encryption
Decryption
Authentication
Authorization
#7
What is the purpose of biometric authentication?
To protect against unauthorized access using physical characteristics
To encrypt data during transmission
To detect malware infections
To create secure passwords
#8
What is the role of a firewall in cybersecurity?
To prevent unauthorized access to or from a private network
To encrypt data transmission
To recover lost data
To identify malware signatures
#9
What is the term used to describe the practice of tricking individuals into revealing sensitive information such as passwords or credit card numbers?
Phishing
Spoofing
Brute Force Attack
Denial of Service (DoS)
#10
Which of the following is NOT considered a best practice for creating secure passwords?
Using a combination of uppercase and lowercase letters
Using easily guessable passwords like 'password' or '123456'
Incorporating numbers and special characters
Avoiding common words or phrases
#11
What is the primary purpose of multi-factor authentication (MFA)?
To provide an additional layer of security by requiring multiple forms of identification
To encrypt data transmission
To detect phishing attempts
To protect against ransomware attacks
#12
Which of the following is NOT a common method to protect data in transit?
SSL/TLS encryption
Firewalls
VPN (Virtual Private Network)
SSH (Secure Shell)
#13
What does the term 'Social Engineering' refer to in the context of cybersecurity?
Manipulating individuals to divulge confidential information
Using advanced algorithms to break encryption
Gaining unauthorized access to a system by exploiting software vulnerabilities
Conducting security audits to identify weaknesses
#14
What is the primary purpose of a security audit?
To assess the effectiveness of security controls and policies
To recover lost data after a security breach
To encrypt sensitive information
To prevent malware infections
#15
What is the main objective of the principle of least privilege in cybersecurity?
To limit access rights for users to the bare minimum permissions they need to perform their tasks
To grant unrestricted access to all users within a network
To prioritize speed over security measures
To restrict access only to privileged users
#16
Which of the following is NOT an example of physical security measures?
Biometric locks
Firewalls
Surveillance cameras
Security guards
#17
In the context of cybersecurity, what is a 'backdoor'?
A hidden method for bypassing normal authentication or encryption
A physical entrance to a secure facility
A type of malware that encrypts data
A method for blocking malicious network traffic
#18
Which of the following is a common method for securing wireless networks?
WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
HTTP (Hypertext Transfer Protocol)
TCP (Transmission Control Protocol)
#19
What does the term 'Patch Management' refer to in cybersecurity?
The process of keeping software up to date with the latest security fixes
The implementation of physical barriers to prevent unauthorized access
The encryption of data stored on a device
The detection and removal of malware from a system
#20
Which of the following is NOT a recommended practice for securing mobile devices?
Enabling device encryption
Disabling automatic updates
Using strong passwords or biometric authentication
Installing reputable antivirus software
#21
What is the purpose of a security token?
To generate one-time passwords for authentication
To provide physical access to secure facilities
To encrypt data transmission over a network
To scan for vulnerabilities in software
#22
Which cryptographic technique uses a single key for both encryption and decryption?
Symmetric Encryption
Asymmetric Encryption
Hashing
Public Key Infrastructure (PKI)
#23
What does the term 'Zero-Day Exploit' refer to in cybersecurity?
A vulnerability that is exploited before the software creator is aware of it
An exploit that targets outdated software versions
A type of malware that spreads rapidly
A security patch released within a day of a vulnerability discovery
#24
Which of the following is a characteristic of a strong encryption algorithm?
It can be easily cracked with basic computing resources
It produces ciphertext that is identical to the plaintext
It is resistant to known cryptographic attacks
It requires the same key for encryption and decryption
#25
What is the purpose of a honeypot in cybersecurity?
To detect and observe attackers
To store sensitive data
To create a secure connection
To encrypt communication channels