#1
Which of the following is NOT a common authentication factor?
Something you want
ExplanationNot a typical authentication factor, unlike something you know or something you have.
#2
What does VPN stand for?
Virtual Private Network
ExplanationCreates secure connections over public networks, enhancing privacy and security.
#3
Which of the following is NOT a best practice for ensuring secure passwords?
Sharing passwords with trusted colleagues
ExplanationContrary to best practices, as sharing passwords compromises security.
#4
What is the purpose of data encryption in information security?
To protect data confidentiality
ExplanationSecures data by encoding it, preventing unauthorized access.
#5
What is a DDoS attack?
A Distributed Denial of Service attack
ExplanationOverwhelms a target system or network with a flood of traffic, rendering it inaccessible.
#6
Which of the following is NOT a common encryption algorithm?
MD5
ExplanationWhile once popular, MD5 is now considered insecure due to vulnerabilities.
#7
What is the purpose of an Intrusion Detection System (IDS)?
To detect and respond to cyberattacks
ExplanationIdentifies and alerts to potential intrusions, enhancing network security.
#8
What is the purpose of a firewall in network security?
To block unauthorized access while permitting authorized communications
ExplanationActs as a barrier, allowing legitimate traffic while blocking unauthorized access.
#9
What is the purpose of a digital signature in cryptographic systems?
To verify the authenticity and integrity of a message
ExplanationConfirms the sender's identity and ensures the message hasn't been altered.
#10
What does the term 'phishing' refer to in the context of cybersecurity?
An attempt to trick individuals into revealing sensitive information
ExplanationAims to deceive individuals into divulging confidential data.
#11
What is the primary purpose of penetration testing?
To identify vulnerabilities and assess the security of a system
ExplanationSimulates attacks to discover weaknesses and bolster defenses.
#12
What is the main goal of network segmentation in information security?
To isolate sensitive data and resources
ExplanationDivides networks to contain breaches and safeguard critical assets.
#13
Which cryptographic technique uses a single key for both encryption and decryption?
Symmetric encryption
ExplanationEmploys the same key for both encrypting and decrypting data.
#14
What is the purpose of a honeypot in cybersecurity?
To attract malicious activity and divert it from real systems
ExplanationLures attackers away from actual targets, aiding threat detection and analysis.