#1
What does the acronym 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
ExplanationCreates a secure connection over the internet, allowing users to access private networks securely.
#2
Which of the following is NOT a type of malware?
Router
ExplanationA network device, not malicious software.
#3
Which protocol is commonly used for secure communication over a computer network, particularly for web browsing?
HTTPS
ExplanationEncrypts data transferred between a web browser and a web server, ensuring confidentiality.
#4
What is the term used to describe a security attack that overwhelms a system with excessive requests, rendering it unavailable to users?
DDoS (Distributed Denial of Service)
ExplanationUtilizes multiple compromised systems to flood a target with traffic, disrupting services.
#5
What does the acronym 'SIEM' stand for in cybersecurity?
Security Information and Event Management
ExplanationAggregates and analyzes security data from various sources to identify and respond to threats.
#6
What is the term used to describe the process of converting plaintext into unintelligible ciphertext?
Encryption
ExplanationSecures sensitive information by converting it into a scrambled format.
#7
What is the purpose of biometric authentication?
To protect against unauthorized access using physical characteristics
ExplanationVerifies identity through unique physical traits like fingerprints or iris patterns.
#8
What is the role of a firewall in cybersecurity?
To prevent unauthorized access to or from a private network
ExplanationMonitors and controls incoming and outgoing network traffic based on predetermined security rules.
#9
What is the term used to describe the practice of tricking individuals into revealing sensitive information such as passwords or credit card numbers?
Phishing
ExplanationTypically involves fraudulent emails or websites impersonating legitimate entities.
#10
Which of the following is NOT considered a best practice for creating secure passwords?
Using easily guessable passwords like 'password' or '123456'
ExplanationWeak passwords are easily compromised, leading to security breaches.
#11
What is the primary purpose of multi-factor authentication (MFA)?
To provide an additional layer of security by requiring multiple forms of identification
ExplanationCombines two or more authentication factors, such as passwords and biometrics, for enhanced security.
#12
Which of the following is NOT a common method to protect data in transit?
Firewalls
ExplanationFirewalls control access to and from networks but do not encrypt data in transit.
#13
What does the term 'Social Engineering' refer to in the context of cybersecurity?
Manipulating individuals to divulge confidential information
ExplanationExploits psychological manipulation to deceive individuals into revealing sensitive information.
#14
What is the primary purpose of a security audit?
To assess the effectiveness of security controls and policies
ExplanationEvaluates the implementation of security measures and identifies areas for improvement.
#15
What is the main objective of the principle of least privilege in cybersecurity?
To limit access rights for users to the bare minimum permissions they need to perform their tasks
ExplanationReduces the potential impact of security breaches by restricting access to only necessary resources.
#16
Which of the following is NOT an example of physical security measures?
Firewalls
ExplanationFirewalls are software or hardware-based security measures, not physical barriers.
#17
In the context of cybersecurity, what is a 'backdoor'?
A hidden method for bypassing normal authentication or encryption
ExplanationProvides unauthorized access to a system, often installed by attackers.
#18
Which of the following is a common method for securing wireless networks?
WPA (Wi-Fi Protected Access)
ExplanationProvides authentication and encryption for Wi-Fi networks, replacing WEP.
#19
What does the term 'Patch Management' refer to in cybersecurity?
The process of keeping software up to date with the latest security fixes
ExplanationReduces vulnerabilities by applying updates to software and systems.
#20
Which of the following is NOT a recommended practice for securing mobile devices?
Disabling automatic updates
ExplanationAutomatic updates ensure devices receive critical security patches in a timely manner.
#21
What is the purpose of a security token?
To generate one-time passwords for authentication
ExplanationProvides an additional layer of security by generating dynamic passwords for authentication.
#22
Which cryptographic technique uses a single key for both encryption and decryption?
Symmetric Encryption
ExplanationEfficient for large amounts of data but requires secure key exchange.
#23
What does the term 'Zero-Day Exploit' refer to in cybersecurity?
A vulnerability that is exploited before the software creator is aware of it
ExplanationTargets flaws unknown to developers, making them vulnerable until patched.
#24
Which of the following is a characteristic of a strong encryption algorithm?
It is resistant to known cryptographic attacks
ExplanationWithstands attempts to break encryption through mathematical or computational methods.
#25
What is the purpose of a honeypot in cybersecurity?
To detect and observe attackers
ExplanationLures attackers to a decoy system to gather information and analyze their tactics.