#1
Which of the following is an example of malware?
Firewall
Antivirus
Spyware
Encryption
#2
What is the purpose of a firewall in cybersecurity?
To detect and remove viruses
To monitor network traffic
To encrypt data
To manage user authentication
#3
What is the primary purpose of ransomware?
To steal sensitive information
To disrupt or deny access to computer systems until a ransom is paid
To monitor user activity
To spread rapidly through a network
#4
What is the key difference between a virus and a worm in the context of malware?
Viruses require user interaction to spread, while worms can spread independently.
Viruses only infect hardware, while worms infect software.
Viruses encrypt files, while worms disrupt network communication.
Viruses target specific individuals, while worms target organizations.
#5
What is the purpose of a honeypot in cybersecurity?
To detect and deflect malicious traffic away from a network
To lure attackers into a controlled environment to gather information about their tactics
To encrypt sensitive data on a network
To monitor user activity on social media platforms
#6
Which of the following is a common method to protect against malware infections?
Disabling firewalls
Downloading software from unknown sources
Regularly updating antivirus definitions
Sharing passwords with colleagues
#7
What is a 'phishing' attack?
A type of malware that spreads through email attachments
A social engineering attack that tricks users into revealing sensitive information
A denial-of-service attack that floods a network with traffic
A type of ransomware that encrypts files
#8
What does the acronym 'DDoS' stand for in the context of cybersecurity?
Data Defense over Servers
Denial of Data and Services
Distributed Denial of Service
Data Disruption Operating System
#9
What is ransomware?
Malicious software that steals sensitive information
Software that blocks access to a computer system until a sum of money is paid
A type of virus that spreads rapidly through email attachments
A technique used by hackers to gain unauthorized access to a network
#10
What is the main purpose of encryption in cybersecurity?
To prevent unauthorized access to data
To detect and remove malware
To monitor network traffic
To manage user authentication
#11
What is the term for a software vulnerability that is unknown to the software vendor but known to attackers?
Zero-day exploit
Backdoor
Buffer overflow
SQL injection
#12
Which of the following is NOT an example of a social engineering attack?
Phishing
Shoulder surfing
Trojan horse
Baiting
#13
Which of the following is a characteristic of a 'worm' in the context of malware?
Requires user interaction to spread
Attacks by encrypting files and demanding ransom
Spreads independently through network vulnerabilities
Modifies existing programs to perform malicious actions
#14
What is the difference between a virus and a Trojan horse?
A virus infects files, while a Trojan horse records keystrokes
A virus spreads independently, while a Trojan horse requires user interaction
A virus steals data, while a Trojan horse encrypts files
A virus disguises itself as legitimate software, while a Trojan horse replicates itself
#15
What is 'social engineering' in the context of cybersecurity?
A technique used to manipulate individuals into divulging confidential information
A method of encrypting data during transmission
A type of malware that spreads through social media platforms
A strategy for securing wireless networks
#16
What is a 'zero-day exploit'?
An attack that occurs at zero hour
A vulnerability in software that is unknown to the vendor
A type of phishing attack that targets zero-day traders
A method of exploiting network traffic
#17
What is the primary function of an Intrusion Detection System (IDS) in cybersecurity?
To prevent unauthorized access to a network
To encrypt sensitive data
To detect and alert on suspicious activities or policy violations
To remove malware from infected devices
#18
What is the term for a security attack that involves overwhelming a system with a flood of requests, rendering it inaccessible to legitimate users?
Spyware
Adware
Phishing
Denial-of-Service (DoS) attack