#1
Which of the following is an example of malware?
Spyware
ExplanationSpyware is a type of malware designed to spy on and gather information from a computer or network.
#2
What is the purpose of a firewall in cybersecurity?
To monitor network traffic
ExplanationA firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.
#3
What is the primary purpose of ransomware?
To disrupt or deny access to computer systems until a ransom is paid
ExplanationRansomware is designed to deny access to computer systems or files until a ransom is paid, often in cryptocurrency.
#4
What is the key difference between a virus and a worm in the context of malware?
Viruses require user interaction to spread, while worms can spread independently.
ExplanationViruses require user action to spread, such as running an infected program, while worms can spread automatically through network vulnerabilities.
#5
What is the purpose of a honeypot in cybersecurity?
To lure attackers into a controlled environment to gather information about their tactics
ExplanationA honeypot is a decoy system designed to lure attackers into it, allowing security professionals to study their methods and gather intelligence.
#6
Which of the following is a common method to protect against malware infections?
Regularly updating antivirus definitions
ExplanationRegularly updating antivirus software ensures it has the latest virus definitions to detect and remove malware.
#7
What is a 'phishing' attack?
A social engineering attack that tricks users into revealing sensitive information
ExplanationPhishing is a type of cyber attack that involves tricking individuals into disclosing sensitive information such as passwords or financial details.
#8
What does the acronym 'DDoS' stand for in the context of cybersecurity?
Distributed Denial of Service
ExplanationDDoS stands for Distributed Denial of Service, where multiple compromised systems are used to flood a target system with traffic, rendering it inaccessible to legitimate users.
#9
What is ransomware?
Software that blocks access to a computer system until a sum of money is paid
ExplanationRansomware is a type of malicious software that encrypts files or systems and demands payment for their release.
#10
What is the main purpose of encryption in cybersecurity?
To prevent unauthorized access to data
ExplanationEncryption scrambles data to make it unreadable to unauthorized users, ensuring confidentiality and security.
#11
What is the term for a software vulnerability that is unknown to the software vendor but known to attackers?
Zero-day exploit
ExplanationA zero-day exploit is a software vulnerability unknown to the vendor but exploited by attackers before a patch is available.
#12
Which of the following is NOT an example of a social engineering attack?
Trojan horse
ExplanationA Trojan horse is a type of malware that disguises itself as legitimate software, not a form of social engineering.
#13
Which of the following is a characteristic of a 'worm' in the context of malware?
Spreads independently through network vulnerabilities
ExplanationWorms are self-replicating malware that spread across networks without requiring user intervention.
#14
What is the difference between a virus and a Trojan horse?
A virus spreads independently, while a Trojan horse requires user interaction
ExplanationViruses attach themselves to legitimate programs and spread when those programs are executed, while Trojan horses rely on users to execute them.
#15
What is 'social engineering' in the context of cybersecurity?
A technique used to manipulate individuals into divulging confidential information
ExplanationSocial engineering involves manipulating individuals to disclose sensitive information or perform actions that may compromise security.
#16
What is a 'zero-day exploit'?
A vulnerability in software that is unknown to the vendor
ExplanationA zero-day exploit is a cyber attack that exploits a previously unknown vulnerability in software, giving the vendor zero days to fix it.
#17
What is the primary function of an Intrusion Detection System (IDS) in cybersecurity?
To detect and alert on suspicious activities or policy violations
ExplanationIDS monitors network or system activities for malicious activities or policy violations and alerts administrators.
#18
What is the term for a security attack that involves overwhelming a system with a flood of requests, rendering it inaccessible to legitimate users?
Denial-of-Service (DoS) attack
ExplanationA DoS attack floods a system or network with traffic, rendering it unavailable to legitimate users.