#1
What is the first line of defense against cyber threats?
Firewall
Antivirus software
User awareness
Intrusion detection system
#2
What is the primary purpose of a security audit in an organization?
To evaluate the physical infrastructure
To assess the financial performance
To identify and address vulnerabilities in security practices
To monitor employee productivity
#3
What is the significance of regular software updates in the context of security?
To slow down the system
To introduce new features
To fix vulnerabilities and improve security
To uninstall unnecessary applications
#4
In the context of security, what does the term 'Patch Management' refer to?
Sewing up holes in physical security fences
Applying updates to software and systems to fix vulnerabilities
Creating decorative patches for uniforms
Managing passwords effectively
#5
What does the term 'Biometric Authentication' refer to in the context of security?
Using biological organisms for security
Verifying identity through unique physical or behavioral characteristics
Encrypting data using biological information
Managing biological hazards in the workplace
#6
Which of the following is a strong password practice?
Using your name and birthdate
Using a combination of uppercase and lowercase letters, numbers, and symbols
Using the same password for multiple accounts
Writing down passwords on a sticky note
#7
What is the purpose of a VPN (Virtual Private Network) in the context of security?
To optimize internet speed
To access blocked websites
To create a secure and encrypted connection over the internet
To manage virtual servers
#8
What is the purpose of multi-factor authentication (MFA) in enhancing security?
To use multiple devices simultaneously
To provide multiple passwords for the same account
To add an extra layer of verification beyond just a password
To encrypt data on the server
#9
Which of the following is an example of physical security measures?
Firewall
Biometric access control
Antivirus software
Intrusion detection system
#10
What is the main goal of a DDoS (Distributed Denial of Service) attack?
To gain unauthorized access to a system
To encrypt sensitive data
To disrupt or disable a targeted server or network
To spread malware across multiple devices
#11
What does the term 'Endpoint Security' refer to in cybersecurity?
Securing physical office locations
Protecting network routers
Securing individual devices like computers and mobile devices
Encrypting data during transmission
#12
What is the primary goal of social engineering attacks?
To encrypt data
To manipulate people into divulging confidential information
To physically break into secure facilities
To install malware on computers
#13
What does the term 'Phishing' refer to in the context of cybersecurity?
Catching malware
Sending malicious emails
Creating strong passwords
Fishing in a virtual reality environment
#14
What does the term 'Zero-Day Exploit' refer to in the field of cybersecurity?
An attack that occurs at midnight
An exploit that targets previously unknown vulnerabilities
An exploit that has zero impact on the system
A security feature that is disabled by default
#15
In the context of cybersecurity, what is the principle of least privilege?
Providing users with maximum permissions
Granting the minimum level of access necessary for tasks
Giving unlimited access to all users
Assigning equal privileges to all users
#16
Which of the following is an example of a biometric authentication method?
Password
Fingerprint recognition
PIN code
Smart card
#17
What is the purpose of a Security Incident Response Plan?
To create new security policies
To respond effectively to security incidents and breaches
To perform regular security audits
To encrypt sensitive files