#1
What does the acronym 'VPN' stand for in the context of cybersecurity?
Virtual Private Network
ExplanationCreates a secure connection over the internet, allowing users to access private networks securely.
#2
Which of the following is NOT a type of malware?
Router
ExplanationA network device, not malicious software.
#3
Which protocol is commonly used for secure communication over a computer network, particularly for web browsing?
HTTPS
ExplanationEncrypts data transferred between a web browser and a web server, ensuring confidentiality.
#4
What is the term used to describe a security attack that overwhelms a system with excessive requests, rendering it unavailable to users?
DDoS (Distributed Denial of Service)
ExplanationUtilizes multiple compromised systems to flood a target with traffic, disrupting services.
#5
What does the acronym 'SIEM' stand for in cybersecurity?
Security Information and Event Management
ExplanationAggregates and analyzes security data from various sources to identify and respond to threats.
#6
What is the term used to describe the process of converting plaintext into unintelligible ciphertext?
Encryption
ExplanationSecures sensitive information by converting it into a scrambled format.
#7
What is the purpose of biometric authentication?
To protect against unauthorized access using physical characteristics
ExplanationVerifies identity through unique physical traits like fingerprints or iris patterns.
#8
What is the role of a firewall in cybersecurity?
To prevent unauthorized access to or from a private network
ExplanationMonitors and controls incoming and outgoing network traffic based on predetermined security rules.
#9
What is the term used to describe the practice of tricking individuals into revealing sensitive information such as passwords or credit card numbers?
Phishing
ExplanationTypically involves fraudulent emails or websites impersonating legitimate entities.
#10
Which of the following is NOT considered a best practice for creating secure passwords?
Using easily guessable passwords like 'password' or '123456'
ExplanationWeak passwords are easily compromised, leading to security breaches.
#11
What is the primary purpose of multi-factor authentication (MFA)?
To provide an additional layer of security by requiring multiple forms of identification
ExplanationCombines two or more authentication factors, such as passwords and biometrics, for enhanced security.
#12
Which of the following is NOT a common method to protect data in transit?
Firewalls
ExplanationFirewalls control access to and from networks but do not encrypt data in transit.
#13
What does the term 'Social Engineering' refer to in the context of cybersecurity?
Manipulating individuals to divulge confidential information
ExplanationExploits psychological manipulation to deceive individuals into revealing sensitive information.
#14
Which cryptographic technique uses a single key for both encryption and decryption?
Symmetric Encryption
ExplanationEfficient for large amounts of data but requires secure key exchange.
#15
What does the term 'Zero-Day Exploit' refer to in cybersecurity?
A vulnerability that is exploited before the software creator is aware of it
ExplanationTargets flaws unknown to developers, making them vulnerable until patched.
#16
Which of the following is a characteristic of a strong encryption algorithm?
It is resistant to known cryptographic attacks
ExplanationWithstands attempts to break encryption through mathematical or computational methods.
#17
What is the purpose of a honeypot in cybersecurity?
To detect and observe attackers
ExplanationLures attackers to a decoy system to gather information and analyze their tactics.