#1
What is the primary goal of penetration testing?
To identify and fix vulnerabilities in a system
To monitor network traffic
To encrypt sensitive data
To install antivirus software
#2
What is the primary focus of social engineering attacks?
Network vulnerabilities
Human psychology and behavior
Firewall configurations
Encryption algorithms
#3
In the context of cybersecurity, what does the term 'phishing' refer to?
Testing the strength of a network's defenses
Gaining unauthorized access to a system
Tricking individuals into revealing sensitive information
Performing denial-of-service attacks
#4
What is the purpose of a vulnerability scanner in penetration testing?
To exploit system vulnerabilities
To identify and assess security weaknesses
To monitor network traffic
To analyze system logs
#5
What is the role of a Security Operations Center (SOC) in cybersecurity?
To perform penetration testing
To monitor and respond to security incidents
To develop encryption algorithms
To analyze system logs
#6
Which phase of penetration testing involves gathering information about the target system?
Exploitation
Reconnaissance
Post-exploitation
Analysis
#7
What is the purpose of a firewall in a cybersecurity context?
To block unauthorized access to a network
To encrypt emails
To recover lost data
To optimize internet speed
#8
What is the main purpose of threat modeling in cybersecurity?
To design secure software systems
To monitor network traffic
To recover lost data
To install antivirus software
#9
Which of the following is NOT a common penetration testing methodology?
Black Box Testing
Gray Box Testing
Yellow Box Testing
White Box Testing
#10
Which of the following is an example of a passive reconnaissance technique?
Port scanning
Social engineering
Packet sniffing
DDoS attacks
#11
Which programming language is commonly used for writing exploits in penetration testing?
#12
What does the term 'zero-day vulnerability' refer to in cybersecurity?
A vulnerability that has been known for a long time
A vulnerability that has never been disclosed publicly
A vulnerability that only affects zero-day attacks
A vulnerability with no known solution or patch
#13
What is the primary objective of a red team in a security assessment?
To defend against cyber threats
To simulate and launch real-world attacks
To analyze system logs
To implement security policies
#14
What is the purpose of a honey pot in cybersecurity?
To detect and deflect malicious activity
To analyze system logs
To recover lost data
To monitor network traffic
#15
In the context of cybersecurity, what is a 'man-in-the-middle' attack?
A type of phishing attack
An attack where an unauthorized person intercepts and alters communication between two parties
A denial-of-service attack
A type of malware attack