#1
What does HTTPS stand for?
HyperText Transfer Protocol Secure
ExplanationHTTPS ensures secure communication over a computer network.
#2
Which of the following is NOT a common social engineering technique?
Malware
ExplanationMalware is a form of malicious software, not a social engineering technique.
#3
What does the term 'phishing' refer to in the context of cybersecurity?
A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication
ExplanationPhishing involves deceiving individuals into revealing confidential information.
#4
Which of the following is NOT a recommended practice to enhance password security?
Sharing passwords with trusted colleagues
ExplanationSharing passwords compromises security and is not recommended.
#5
What is the principle behind the 'least privilege' security concept?
Restricting users' access rights to the minimum necessary to perform their job functions
ExplanationLeast privilege ensures users only have access required for their tasks, limiting potential damage.
#6
Which of the following is a common method to protect sensitive information transmitted over public networks?
Implementing end-to-end encryption
ExplanationEnd-to-end encryption safeguards data from interception during transmission.
#7
What is the purpose of a firewall?
To detect and prevent unauthorized access to or from a private network
ExplanationFirewalls act as barriers to protect networks from unauthorized access.
#8
What is the main goal of encryption?
To prevent unauthorized access to data
ExplanationEncryption secures data by encoding it in a way that only authorized parties can access.
#9
What is a VPN (Virtual Private Network) primarily used for?
Encrypting internet traffic to ensure privacy and security
ExplanationVPNs create secure connections over public networks to protect data.
#10
Which of the following is a characteristic of a strong password?
Includes a mix of uppercase and lowercase letters, numbers, and symbols
ExplanationStrong passwords incorporate various characters to enhance security.
#11
What is the primary purpose of security patches in software?
To fix security vulnerabilities and bugs
ExplanationSecurity patches address vulnerabilities to maintain software integrity.
#12
What is the role of a Security Information and Event Management (SIEM) system?
To monitor, detect, and respond to security incidents in real-time
ExplanationSIEM systems analyze security events to detect and respond to threats.
#13
What is the purpose of multi-factor authentication (MFA)?
To provide additional security by requiring multiple forms of verification
ExplanationMFA enhances security by requiring more than one authentication method.
#14
What is the main purpose of a security audit?
To assess and evaluate the effectiveness of security controls and procedures
ExplanationSecurity audits identify vulnerabilities and assess security measures.
#15
What is the purpose of a penetration test?
To assess the vulnerability of a system by simulating real-world attacks
ExplanationPenetration tests evaluate system weaknesses through simulated attacks.
#16
What is the purpose of a Security Incident Response Plan (SIRP)?
To respond effectively to security incidents and minimize their impact
ExplanationSIRPs outline steps to manage and mitigate security incidents.
#17
What is the purpose of a Security Policy?
To establish rules and guidelines for protecting an organization's assets
ExplanationSecurity policies set standards for safeguarding organizational assets.