#1
Which of the following is NOT a common social engineering technique?
Denial of Service (DoS)
ExplanationDenial of Service (DoS) is a type of cyberattack that disrupts access to a service, but it is not a social engineering technique.
#2
What does 'HTTPS' stand for in the context of web browsing?
HyperText Transfer Protocol Secure
ExplanationHTTPS stands for HyperText Transfer Protocol Secure, providing secure communication over a computer network.
#3
What is the purpose of a firewall in network security?
To monitor and control incoming and outgoing network traffic
ExplanationA firewall's purpose in network security is to monitor and control the flow of incoming and outgoing traffic.
#4
What is the primary purpose of a VPN (Virtual Private Network)?
To provide secure remote access to a private network
ExplanationA VPN's primary purpose is to offer secure remote access to a private network over the internet.
#5
What is the difference between a virus and a worm in the context of computer security?
A virus requires user interaction to spread, while a worm spreads automatically.
ExplanationA virus needs user interaction, while a worm can spread automatically without user involvement.
#6
Which of the following is an example of two-factor authentication?
Fingerprint scan
ExplanationA fingerprint scan is an example of two-factor authentication, requiring both a password and a biometric factor for access.
#7
What does 'SQL injection' refer to in cybersecurity?
A method to gain unauthorized access to a database
ExplanationSQL injection is a cyberattack method used to gain unauthorized access to a database by injecting malicious SQL code.
#8
What does 'GDPR' stand for in the context of data protection?
General Data Protection Regulation
ExplanationGDPR stands for General Data Protection Regulation, a legal framework for data protection and privacy.
#9
Which of the following is a common method to secure wireless networks?
MAC filtering
ExplanationMAC filtering is a common method to secure wireless networks by controlling access based on device MAC addresses.
#10
Which of the following is an example of physical security?
Security camera
ExplanationA security camera is an example of physical security, providing surveillance and monitoring.
#11
Which of the following best describes the term 'zero-day vulnerability'?
A vulnerability that has not been exploited yet
ExplanationA zero-day vulnerability is a security flaw that has not been exploited or disclosed publicly.
#12
What is the purpose of an Intrusion Detection System (IDS)?
To identify and respond to suspicious activities or security breaches
ExplanationAn Intrusion Detection System (IDS) aims to identify and respond to suspicious activities or security breaches in a network.
#13
What is the purpose of a security policy in an organization?
To set guidelines and procedures for protecting assets and data
ExplanationThe purpose of a security policy is to establish guidelines and procedures for safeguarding an organization's assets and data.
#14
What does 'phishing' refer to in the context of cybersecurity?
An attempt to deceive individuals into revealing sensitive information
ExplanationPhishing is an attempt to deceive individuals into revealing sensitive information, often through fraudulent emails or websites.