0% found this document useful (0 votes)
49 views24 pages

Cyber Security

The document provides a comprehensive overview of various cybersecurity concepts, including definitions and characteristics of phishing, zero-day vulnerabilities, firewalls, ransomware, social engineering, and more. It outlines the importance of security measures like multi-factor authentication, encryption, and the principle of least privilege, as well as the roles of different types of malware and attacks. Additionally, it discusses the significance of ethical hacking, patch management, and the use of honeypots in cybersecurity strategies.

Uploaded by

debmalya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views24 pages

Cyber Security

The document provides a comprehensive overview of various cybersecurity concepts, including definitions and characteristics of phishing, zero-day vulnerabilities, firewalls, ransomware, social engineering, and more. It outlines the importance of security measures like multi-factor authentication, encryption, and the principle of least privilege, as well as the roles of different types of malware and attacks. Additionally, it discusses the significance of ethical hacking, patch management, and the use of honeypots in cybersecurity strategies.

Uploaded by

debmalya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

CYBER SECURITY

1. What does the term "phishing" refer to in cybersecurity?

A) A method of intercepting data between two systems


B) A form of attack that attempts to steal sensitive information by pretending to be a
trustworthy entity
C) A way to encrypt data for secure communication
D) A technique for backing up data to a secure location

Answer: B) A form of attack that attempts to steal sensitive information by pretending to be


a trustworthy entity

2. Which of the following is a characteristic of a "zero-day" vulnerability?

A) It is a vulnerability that has been publicly disclosed but not yet patched
B) It is a vulnerability that is unknown to the vendor and has no patch available
C) It refers to a vulnerability that has existed for at least 30 days
D) It is a type of malware that spreads through email attachments

Answer: B) It is a vulnerability that is unknown to the vendor and has no patch available

3. What is the main purpose of a firewall in network security?

A) To monitor and analyze network traffic for suspicious activity


B) To authenticate users before granting access to the system
C) To prevent unauthorized access to or from a private network
D) To encrypt all data sent over the network

Answer: C) To prevent unauthorized access to or from a private network

4. Which of the following is the best way to protect sensitive data from unauthorized
access?

A) Use strong, complex passwords and change them regularly


B) Share your passwords with trusted colleagues to improve collaboration
C) Disable all security software to improve system performance
D) Avoid using encryption to keep data access simple

Answer: A) Use strong, complex passwords and change them regularly


5. What does the term "ransomware" refer to?

A) A type of attack that tricks users into giving away personal information
B) Malicious software that locks or encrypts data and demands payment for its release
C) A method of securing network traffic using encryption
D) A tool that monitors network traffic for signs of an intrusion

Answer: B) Malicious software that locks or encrypts data and demands payment for its
release

6. Which of the following is an example of "social engineering"?

A) A hacker exploiting a software vulnerability


B) An attacker using malware to gain access to a system
C) An attacker manipulating individuals into divulging confidential information
D) A network administrator configuring a firewall to block malicious traffic

Answer: C) An attacker manipulating individuals into divulging confidential information

7. What is the main function of multi-factor authentication (MFA)?

A) It encrypts communication between two parties


B) It requires multiple forms of identity verification to grant access to a system
C) It protects against phishing attacks
D) It monitors user activity to detect suspicious behavior

Answer: B) It requires multiple forms of identity verification to grant access to a system

8. What is the purpose of a VPN (Virtual Private Network)?

A) To monitor and block malicious website traffic


B) To hide a user's IP address and encrypt data traffic over the internet
C) To scan for malware in files before they are opened
D) To store backup copies of important files in the cloud

Answer: B) To hide a user's IP address and encrypt data traffic over the internet

9. Which of the following is a common method used in Distributed Denial of Service


(DDoS) attacks?

A) Encrypting data and demanding payment for its release


B) Overloading a server with traffic to make it unavailable to users
C) Trick users into giving away their login credentials
D) Infecting a network with a worm that spreads automatically

Answer: B) Overloading a server with traffic to make it unavailable to users

10. What is the primary goal of ethical hacking?

A) To exploit security flaws for personal gain


B) To identify and fix security vulnerabilities before malicious hackers can exploit them
C) To steal confidential information for intelligence purposes
D) To create viruses and test antivirus software

Answer: B) To identify and fix security vulnerabilities before malicious hackers can exploit
them

11. What is the purpose of encryption in cybersecurity?

A) To prevent unauthorized access to sensitive information by converting it into unreadable


data
B) To detect unauthorized access attempts to a system
C) To ensure the integrity of a message
D) To monitor and log network traffic

Answer: A) To prevent unauthorized access to sensitive information by converting it into


unreadable data

12. Which of the following is an example of "insider threat"?

A) A hacker exploiting a vulnerability in a system


B) A malware infection caused by downloading a malicious attachment
C) A company employee stealing sensitive company data
D) A Distributed Denial of Service (DDoS) attack

Answer: C) A company employee stealing sensitive company data

13. What does the term "buffer overflow" refer to in the context of cybersecurity?

A) A type of attack that causes a system to crash by sending too much data into a buffer
B) An attempt to bypass a firewall by flooding it with packets
C) A method of encrypting sensitive data before transmission
D) A weakness in user authentication systems
Answer: A) A type of attack that causes a system to crash by sending too much data into a
buffer

14. Which of the following types of malware is designed to replicate itself and spread to
other systems without user intervention?

A) Virus
B) Trojan horse
C) Worm
D) Ransomware

Answer: C) Worm

15. Which of the following is a key characteristic of a "man-in-the-middle" (MitM)


attack?

A) The attacker intercepts and potentially alters communication between two parties
B) The attacker blocks access to a website by flooding it with traffic
C) The attacker encrypts files and demands a ransom for decryption
D) The attacker gains access to a system by exploiting a vulnerability

Answer: A) The attacker intercepts and potentially alters communication between two
parties

16. What is the role of an Intrusion Detection System (IDS)?

A) To encrypt data during transmission


B) To monitor network traffic and detect signs of malicious activity
C) To authenticate users before they access a system
D) To block access to untrusted websites

Answer: B) To monitor network traffic and detect signs of malicious activity

17. Which of the following is NOT a type of authentication factor used in multi-factor
authentication (MFA)?

A) Something you know (password)


B) Something you have (smartphone)
C) Something you are (fingerprint)
D) Something you see (screen lock pattern)

Answer: D) Something you see (screen lock pattern)


18. What is "SQL injection"?

A) A type of malware that modifies database entries


B) A technique used to bypass firewalls and access databases
C) A code injection technique that exploits vulnerabilities in web applications to execute
malicious SQL queries
D) A method of extracting data from a database without permission

Answer: C) A code injection technique that exploits vulnerabilities in web applications to


execute malicious SQL queries

19. What does the principle of "least privilege" mean in cybersecurity?

A) Giving users the maximum level of access necessary to perform their tasks
B) Restricting user access to the minimum necessary to perform their duties
C) Ensuring that employees have access to all systems to improve productivity
D) Enforcing strict password policies for all users

Answer: B) Restricting user access to the minimum necessary to perform their duties

20. What is a "honeypot" in cybersecurity?

A) A device that automatically blocks malware from entering a network


B) A system designed to lure and trap attackers, allowing security teams to study their tactics
C) A software program that detects and removes viruses from a system
D) A tool used to encrypt communication between two parties

Answer: B) A system designed to lure and trap attackers, allowing security teams to study
their tactics

21. What does the term "patch management" refer to?

A) The process of backing up software to prevent data loss


B) The process of ensuring all software is updated to fix known vulnerabilities
C) The process of encrypting data stored on a system
D) The process of auditing network traffic for unauthorized access

Answer: B) The process of ensuring all software is updated to fix known vulnerabilities

22. Which of the following is a common feature of Advanced Persistent Threats (APTs)?
A) They are random attacks with no long-term objectives
B) They involve targeted, long-term infiltration of networks by well-funded, organized
attackers
C) They rely on exploiting simple vulnerabilities
D) They are usually detected and stopped within hours

Answer: B) They involve targeted, long-term infiltration of networks by well-funded,


organized attackers

23. Which of the following best describes the function of antivirus software?

A) It encrypts all data on a system to ensure confidentiality


B) It scans files and programs for known malware and removes them
C) It tracks all network activity to detect unusual behavior
D) It sets up firewalls to block incoming threats

Answer: B) It scans files and programs for known malware and removes them

24. What is the most common method used for data theft in a "brute-force" attack?

A) Intercepting data through a man-in-the-middle attack


B) Trying many different combinations of usernames and passwords to gain unauthorized
access
C) Sending a virus to corrupt system files
D) Stealing physical hardware from a target location

Answer: B) Trying many different combinations of usernames and passwords to gain


unauthorized access

25. Which of the following is the primary difference between "black hat" hackers and
"white hat" hackers?

A) Black hat hackers work for government agencies, while white hat hackers work for private
companies
B) Black hat hackers engage in malicious activities for personal gain, while white hat hackers
help improve security
C) Black hat hackers only target individuals, while white hat hackers target organizations
D) There is no difference; both work in similar ways

Answer: B) Black hat hackers engage in malicious activities for personal gain, while white
hat hackers help improve security
26. What is the main goal of a "Denial of Service" (DoS) attack?

A) To steal sensitive data from a target system


B) To overwhelm a system with traffic, making it unavailable to users
C) To install malware on a system to collect information
D) To intercept communications between two systems

Answer: B) To overwhelm a system with traffic, making it unavailable to users

27. Which of the following is NOT a form of authentication commonly used in multi-
factor authentication (MFA)?

A) Biometric verification (fingerprint, retina scan)


B) A one-time password (OTP) sent via SMS or email
C) Passwords that are shared among multiple users
D) A physical token or smart card

Answer: C) Passwords that are shared among multiple users

28. What is "social engineering" in the context of cybersecurity?

A) An attack that exploits vulnerabilities in software applications


B) Manipulating individuals into revealing confidential information by exploiting
psychological weaknesses
C) A method of encrypting data before transmission
D) A process of creating strong passwords to prevent unauthorized access

Answer: B) Manipulating individuals into revealing confidential information by exploiting


psychological weaknesses

29. Which of the following is the best way to protect against a "brute-force" password
attack?

A) Use simple and easy-to-remember passwords


B) Employ a long and complex password along with account lockout mechanisms after
several failed attempts
C) Avoid using two-factor authentication
D) Use the same password across multiple accounts for convenience

Answer: B) Employ a long and complex password along with account lockout mechanisms
after several failed attempts
30. What is the primary purpose of a digital signature in cybersecurity?

A) To encrypt a file so that only the recipient can read it


B) To ensure the integrity of a message and authenticate the sender’s identity
C) To mask the sender’s identity during email communication
D) To scan a message for potential malware

Answer: B) To ensure the integrity of a message and authenticate the sender’s identity

31. Which of the following is a type of attack where malicious code is inserted into a
website to steal login credentials or spread malware to visitors?

A) Cross-Site Scripting (XSS)


B) Phishing
C) Man-in-the-middle attack
D) SQL injection

Answer: A) Cross-Site Scripting (XSS)

32. What does the term "two-factor authentication" (2FA) mean?

A) The user must change their password every 30 days


B) The user must authenticate using two different forms of verification to access a system
C) The user’s identity is verified using a fingerprint and a password
D) The user must authenticate once with a password and a backup PIN code

Answer: B) The user must authenticate using two different forms of verification to access a
system

33. Which of the following types of attacks relies on exploiting vulnerabilities in a


system that have not been patched or updated?

A) Zero-day attack
B) Phishing attack
C) Ransomware attack
D) Social engineering attack

Answer: A) Zero-day attack

34. In the context of cybersecurity, what does the term "rootkit" refer to?
A) A tool designed to detect malware in a system
B) A type of malware that hides its presence by modifying the operating system
C) A firewall configuration to block unauthorized access
D) A type of encryption used for secure communications

Answer: B) A type of malware that hides its presence by modifying the operating system

35. Which of the following is the best way to mitigate the risk of a "SQL injection"
attack?

A) Use strong passwords for database access


B) Encrypt all data stored in the database
C) Use prepared statements and parameterized queries to interact with the database
D) Disable JavaScript on the website

Answer: C) Use prepared statements and parameterized queries to interact with the database

36. What is the key difference between a "virus" and a "worm" in cybersecurity?

A) A virus requires user interaction to spread, while a worm can spread autonomously
without user interaction
B) A virus is designed to steal data, while a worm is designed to destroy data
C) A virus is a type of phishing attack, while a worm is a form of DDoS attack
D) A virus spreads via email attachments, while a worm spreads via social engineering

Answer: A) A virus requires user interaction to spread, while a worm can spread
autonomously without user interaction

37. Which of the following describes a "drive-by download"?

A) A legitimate software update automatically downloaded by a user's computer


B) Malware that is automatically downloaded to a user’s computer when they visit a
compromised website
C) A form of phishing attack that involves downloading malicious attachments
D) A type of spyware that tracks a user’s movements online

Answer: B) Malware that is automatically downloaded to a user’s computer when they visit a
compromised website

38. Which of the following is the main function of a "security information and event
management" (SIEM) system?
A) To perform daily backups of critical data
B) To monitor, analyze, and respond to security incidents in real-time
C) To detect and remove viruses from a network
D) To provide end-user training on security best practices

Answer: B) To monitor, analyze, and respond to security incidents in real-time

39. Which of the following is an example of "data exfiltration"?

A) Encrypting data to ensure it is protected during transmission


B) Sending sensitive data from an organization's network to an unauthorized third party
C) Blocking access to a specific website to prevent data leakage
D) Detecting and preventing malware from entering a system

Answer: B) Sending sensitive data from an organization's network to an unauthorized third


party

40. Which of the following is a common use of a "honeypot" in cybersecurity?

A) To attract attackers and monitor their methods without compromising real systems
B) To automatically patch security vulnerabilities in real-time
C) To perform a denial-of-service attack against malicious actors
D) To store backups of critical system data for recovery purposes

Answer: A) To attract attackers and monitor their methods without compromising real
systems

41. What does the term "social engineering" generally refer to?

A) Technical measures to protect against cyberattacks


B) Manipulating people into revealing confidential information or performing certain actions
C) Encryption techniques used to secure data
D) Building social networks to collaborate on cybersecurity efforts

Answer: B) Manipulating people into revealing confidential information or performing


certain actions

42. What is "DNS spoofing" (also known as "DNS cache poisoning")?

A) An attack that floods a DNS server with requests to cause a denial of service
B) A method for intercepting encrypted communications between a client and a server
C) An attack that alters the DNS records of a server to redirect users to malicious websites
D) A technique used to disguise the identity of a website using fake DNS entries

Answer: C) An attack that alters the DNS records of a server to redirect users to malicious
websites

43. What is the primary function of a "sandbox" in cybersecurity?

A) To store sensitive data securely


B) To isolate and analyze potentially malicious files in a controlled environment
C) To block unauthorized websites from being accessed
D) To prevent data breaches by encrypting sensitive files

Answer: B) To isolate and analyze potentially malicious files in a controlled environment

44. Which of the following is the most effective way to prevent malware from spreading
within an organization?

A) Disable all external devices, including USB drives


B) Use a VPN to encrypt all network traffic
C) Install antivirus software and ensure regular updates and scans
D) Only allow employees to access the internet during working hours

Answer: C) Install antivirus software and ensure regular updates and scans

45. What is a "Privilege Escalation" attack?

A) An attack where the attacker gains higher levels of access or control over a system than
originally permitted
B) An attack that floods a network with traffic to deny service
C) An attack that steals sensitive data without gaining full access to the system
D) An attack where the attacker inserts malicious code into a website to compromise visitors

Answer: A) An attack where the attacker gains higher levels of access or control over a
system than originally permitted

46. What is the primary function of a "public key" in asymmetric encryption?

A) To encrypt data before it is transmitted


B) To decrypt data that has been encrypted with the corresponding private key
C) To securely store passwords in a hash format
D) To verify the identity of the sender
Answer: B) To decrypt data that has been encrypted with the corresponding private key

47. Which of the following is a characteristic of "cryptojacking"?

A) Malicious software that encrypts data and demands payment for its release
B) Malware that secretly uses the victim's computing resources to mine cryptocurrency
C) A phishing attack aimed at stealing login credentials for cryptocurrency accounts
D) A method used to bypass firewalls by mining encrypted data packets

Answer: B) Malware that secretly uses the victim's computing resources to mine
cryptocurrency

48. Which of the following is the best definition of "network segmentation"?

A) The process of isolating critical systems on separate physical networks to enhance security
B) The process of encrypting data between devices in a network
C) The practice of scanning network traffic for malware
D) The division of a network into different zones to improve traffic management

Answer: A) The process of isolating critical systems on separate physical networks to


enhance security

49. What is a "hash function" used for in cybersecurity?

A) To encrypt data for secure transmission


B) To verify the integrity of data by generating a unique value (hash)
C) To monitor network traffic for malicious activity
D) To securely store passwords by transforming them into unreadable data

Answer: B) To verify the integrity of data by generating a unique value (hash)

50. Which of the following types of malware is designed to replicate itself and spread to
other systems without requiring user interaction?

A) Ransomware
B) Trojan horse
C) Worm
D) Adware

Answer: C) Worm
51. What is the purpose of a "VPN" (Virtual Private Network)?

A) To ensure data is securely encrypted while being transmitted over the internet
B) To monitor and block malicious web traffic
C) To perform regular backups of system data
D) To hide the IP address and maintain anonymity while browsing the internet

Answer: A) To ensure data is securely encrypted while being transmitted over the internet

52. What does the "CIA triad" stand for in the context of cybersecurity?

A) Confidentiality, Integrity, and Accessibility


B) Control, Identification, and Authentication
C) Cryptography, Integrity, and Authentication
D) Confidentiality, Integrity, and Availability

Answer: D) Confidentiality, Integrity, and Availability

53. Which of the following is the main risk of using public Wi-Fi networks without
encryption?

A) Data could be intercepted by attackers, compromising sensitive information


B) The network could be automatically connected to by malicious devices
C) It could result in slower internet speeds and unreliable connections
D) The Wi-Fi network may automatically block certain websites

Answer: A) Data could be intercepted by attackers, compromising sensitive information

54. Which of the following is a common method to defend against a "phishing" attack?

A) Encrypt all communication between parties


B) Use an email filter to detect suspicious messages
C) Disable JavaScript in web browsers
D) Use a unique password for each account

Answer: B) Use an email filter to detect suspicious messages

55. What does the acronym "RAT" stand for in cybersecurity?

A) Remote Access Trojan


B) Real-time Authentication Tool
C) Root Access Trojan
D) Rapid Attack Technique

Answer: A) Remote Access Trojan

56. What is the primary goal of "data loss prevention" (DLP) software?

A) To monitor and restrict unauthorized access to sensitive data


B) To encrypt data before transmission
C) To detect and remove malicious software
D) To block all incoming network traffic

Answer: A) To monitor and restrict unauthorized access to sensitive data

57. What does the term "endpoint security" refer to?

A) Protection for servers, routers, and switches in a network


B) Securing network communication channels using firewalls and encryption
C) Securing the individual devices that connect to a network, such as computers, mobile
phones, and tablets
D) Protecting the physical hardware from theft and damage

Answer: C) Securing the individual devices that connect to a network, such as computers,
mobile phones, and tablets

58. What is "cyber hygiene"?

A) Regularly backing up data to prevent loss


B) The practice of maintaining good security habits to reduce the risk of cyberattacks
C) Scanning emails for malware attachments
D) Using firewalls to protect network traffic

Answer: B) The practice of maintaining good security habits to reduce the risk of
cyberattacks

59. What is the key difference between "black hat" and "white hat" hackers?

A) Black hat hackers work legally, while white hat hackers operate illegally
B) Black hat hackers use their skills for malicious purposes, while white hat hackers use them
to improve security
C) Black hat hackers use only phishing, while white hat hackers use other techniques
D) There is no difference; both types of hackers perform the same activities
Answer: B) Black hat hackers use their skills for malicious purposes, while white hat hackers
use them to improve security

60. What is the primary goal of "data encryption" in cybersecurity?

A) To reduce the size of data for faster transmission


B) To ensure that data is not modified or corrupted during transfer
C) To protect the confidentiality of data by making it unreadable without the correct
decryption key
D) To speed up the process of accessing and sharing data

Answer: C) To protect the confidentiality of data by making it unreadable without the correct
decryption key

61. What is the main purpose of an "Intrusion Prevention System" (IPS)?

A) To identify vulnerabilities in a network


B) To monitor network traffic and block potential threats in real-time
C) To manage user authentication and access control
D) To scan emails for malware

Answer: B) To monitor network traffic and block potential threats in real-time

62. What is "data masking"?

A) Encrypting data to make it unreadable


B) Hiding sensitive data by replacing it with fictitious data in a non-production environment
C) Obfuscating data during transmission to prevent interception
D) Storing data in a secure location to protect it from unauthorized access

Answer: B) Hiding sensitive data by replacing it with fictitious data in a non-production


environment

63. What does "penetration testing" (pen testing) involve?

A) Monitoring network traffic for malicious behavior


B) Exploiting known vulnerabilities to identify weaknesses in a system or network
C) Blocking unauthorized users from accessing a network
D) Encrypting communication channels to secure data

Answer: B) Exploiting known vulnerabilities to identify weaknesses in a system or network


64. What is the purpose of a "hashing" algorithm?

A) To encrypt data for secure transmission


B) To verify the integrity of data by converting it into a fixed-size string of characters
C) To authenticate users based on their biometric data
D) To generate random passwords for secure access

Answer: B) To verify the integrity of data by converting it into a fixed-size string of


characters

65. What is the most effective way to defend against "brute-force" attacks?

A) Use short, simple passwords to make them easier to remember


B) Use CAPTCHA to prevent automated password attempts
C) Employ strong, complex passwords and limit login attempts after a set number of failures
D) Disable multi-factor authentication (MFA)

Answer: C) Employ strong, complex passwords and limit login attempts after a set number
of failures

66. Which of the following is a characteristic of a "Trojan horse" malware?

A) It spreads autonomously from system to system


B) It masquerades as legitimate software to trick users into installing it
C) It encrypts files and demands a ransom for decryption
D) It blocks access to websites by flooding them with traffic

Answer: B) It masquerades as legitimate software to trick users into installing it

67. What is the primary function of a "firewall" in network security?

A) To monitor and log user activity on a network


B) To prevent unauthorized access to or from a private network by filtering traffic
C) To store backup copies of critical files
D) To detect and remove viruses from a system

Answer: B) To prevent unauthorized access to or from a private network by filtering traffic

68. What does the term "data encryption" refer to?


A) Converting data into a format that can only be read by authorized users
B) Storing data in an external location for backup purposes
C) Compressing data to reduce file size
D) Making data publicly accessible for sharing purposes

Answer: A) Converting data into a format that can only be read by authorized users

69. Which of the following is the main risk of using outdated or unsupported software in
a network?

A) Increased system performance


B) The risk of security vulnerabilities that may be exploited by attackers
C) Decreased need for patch management
D) Reduced administrative costs

Answer: B) The risk of security vulnerabilities that may be exploited by attackers

70. What is the main goal of a "Distributed Denial of Service" (DDoS) attack?

A) To steal login credentials and personal information


B) To block access to a system by overwhelming it with traffic from multiple sources
C) To inject malicious code into a website
D) To gain unauthorized access to a system by exploiting a vulnerability

Answer: B) To block access to a system by overwhelming it with traffic from multiple


sources

71. Which of the following is the primary purpose of using "SSL/TLS" in


cybersecurity?

A) To encrypt email communication


B) To provide secure communication over a network (typically the internet) by encrypting
data during transmission
C) To authenticate user credentials
D) To filter out malicious traffic in a network

Answer: B) To provide secure communication over a network (typically the internet) by


encrypting data during transmission

72. What is "two-factor authentication" (2FA)?


A) A method of verifying a user's identity using two separate passwords
B) A process that combines two different forms of authentication to improve security
C) A technique for verifying the integrity of network traffic
D) A tool for encrypting all communication in real-time

Answer: B) A process that combines two different forms of authentication to improve


security

73. Which of the following is NOT a common attack vector used by cybercriminals?

A) Social engineering
B) Exploiting software vulnerabilities
C) Using strong, encrypted passwords
D) Malicious email attachments (phishing)

Answer: C) Using strong, encrypted passwords

74. What is "social engineering" in the context of a phishing attack?

A) Using technical exploits to gain unauthorized access to systems


B) Manipulating individuals into revealing confidential information or performing certain
actions
C) Encrypting sensitive data to prevent unauthorized access
D) Installing a rootkit on a system to steal user credentials

Answer: B) Manipulating individuals into revealing confidential information or performing


certain actions

75. What is the purpose of a "patch" in cybersecurity?

A) To increase system performance and reduce system errors


B) To fix security vulnerabilities or bugs in software applications
C) To block unauthorized users from accessing a network
D) To ensure secure communication over a network

Answer: B) To fix security vulnerabilities or bugs in software applications

76. Which of the following types of malware is specifically designed to collect personal
information from a victim’s system?

A) Trojan horse
B) Keylogger
C) Worm
D) Ransomware

Answer: B) Keylogger

77. What does the term "data breach" refer to?

A) The process of securing a system against unauthorized access


B) An event where sensitive or confidential data is accessed or disclosed without
authorization
C) The unauthorized modification of a system or file
D) The detection of unauthorized devices connecting to a network

Answer: B) An event where sensitive or confidential data is accessed or disclosed without


authorization

78. Which of the following is the main purpose of "endpoint protection" software?

A) To protect the data in transit between devices


B) To secure individual devices (e.g., computers, smartphones) connected to a network
C) To monitor network traffic for suspicious activity
D) To enforce strong password policies for users

Answer: B) To secure individual devices (e.g., computers, smartphones) connected to a


network

79. Which of the following is a common method of preventing unauthorized access to a


computer system?

A) Implementing multi-factor authentication (MFA)


B) Disabling all antivirus software
C) Using only weak, easily memorable passwords
D) Allowing guest accounts for all users

Answer: A) Implementing multi-factor authentication (MFA)

80. Which of the following describes a "drive-by download" attack?

A) An attacker manually infects a system by physically accessing it


B) Malware is automatically downloaded onto a user's device when they visit a compromised
website
C) An attacker sends a phishing email with a malicious link
D) A piece of software that monitors network traffic and steals credentials

Answer: B) Malware is automatically downloaded onto a user's device when they visit a
compromised website

81. What is "salting" in password hashing?

A) Encrypting passwords with a random value before storing them


B) Adding a random value to passwords before hashing to make them more secure
C) Storing passwords in plain text but encrypting them during transmission
D) Generating a new password each time a user logs in

Answer: B) Adding a random value to passwords before hashing to make them more secure

82. Which of the following is a key component of "Defense in Depth" security strategy?

A) Relying on a single security measure to protect the network


B) Using multiple layers of security controls to protect systems and data
C) Employing social engineering to trick attackers into revealing their plans
D) Focusing only on perimeter defense, such as firewalls and intrusion detection systems

Answer: B) Using multiple layers of security controls to protect systems and data

83. What is the primary function of "multi-factor authentication" (MFA)?

A) To increase password complexity


B) To combine multiple methods of user verification for added security
C) To simplify user login processes
D) To reduce network traffic and improve performance

Answer: B) To combine multiple methods of user verification for added security

84. What does the term "backdoor" refer to in the context of cybersecurity?

A) A feature used to provide legitimate access to a system


B) A hidden method of gaining unauthorized access to a system
C) A type of firewall that blocks external threats
D) A tool used for testing network performance

Answer: B) A hidden method of gaining unauthorized access to a system


85. Which of the following is a typical behavior of "ransomware"?

A) It spreads by sending malicious attachments in emails


B) It locks the victim’s data and demands a ransom for decryption
C) It secretly mines cryptocurrency using the victim's resources
D) It collects sensitive data and sends it to attackers without the victim’s knowledge

Answer: B) It locks the victim’s data and demands a ransom for decryption

86. What is "whaling" in the context of cybersecurity?

A) A type of phishing attack targeting high-level executives or important individuals


B) A method of flooding a website with traffic to cause a denial of service
C) An attack that uses fake security certificates to steal personal information
D) A type of ransomware that specifically targets government agencies

Answer: A) A type of phishing attack targeting high-level executives or important


individuals

87. What is "email spoofing"?

A) Sending unsolicited emails to many users in a short time


B) Altering the sender’s email address to make it appear as though the email is from a trusted
source
C) Encrypting emails to prevent interception
D) Blocking email messages with malicious attachments

Answer: B) Altering the sender’s email address to make it appear as though the email is from
a trusted source

88. What does "patch management" refer to?

A) The process of creating backup copies of critical data


B) The process of applying software updates and fixes to systems to address vulnerabilities
C) The process of securing network traffic using encryption
D) The technique of monitoring and blocking malicious traffic

Answer: B) The process of applying software updates and fixes to systems to address
vulnerabilities
89. What is the role of an "access control list" (ACL) in cybersecurity?

A) It monitors the content of files for any suspicious activity


B) It defines which users or systems have access to specific resources or services
C) It encrypts data to ensure confidentiality during transmission
D) It logs system activity for auditing and compliance purposes

Answer: B) It defines which users or systems have access to specific resources or services

90. What is a "man-in-the-middle" (MITM) attack?

A) An attacker intercepts and potentially alters communication between two parties without
their knowledge
B) An attacker floods a target system with traffic to exhaust its resources
C) An attacker hijacks a session to impersonate a user and gain unauthorized access
D) An attacker infects a system with malware to exfiltrate sensitive data

Answer: A) An attacker intercepts and potentially alters communication between two parties
without their knowledge

91. What is "zero-day vulnerability"?

A) A vulnerability that is discovered but has not yet been publicly disclosed or patched
B) A vulnerability that occurs only on specific operating systems
C) A vulnerability that is always present in a system regardless of configuration
D) A vulnerability that is identified through regular software updates

Answer: A) A vulnerability that is discovered but has not yet been publicly disclosed or
patched

92. Which of the following is the purpose of an "anti-virus" software?

A) To monitor network traffic for suspicious behavior


B) To remove malicious software (viruses, worms, etc.) from infected systems
C) To encrypt data during transmission
D) To control access to network resources based on user roles

Answer: B) To remove malicious software (viruses, worms, etc.) from infected systems

93. What is the role of an "authentication token" in cybersecurity?


A) It ensures that data transmitted between two systems remains confidential
B) It verifies the identity of a user or system through a secure token or key
C) It scans for malware and malicious code in emails and files
D) It secures backup data in the cloud

Answer: B) It verifies the identity of a user or system through a secure token or key

94. Which of the following is a "botnet"?

A) A network of infected devices controlled by cybercriminals to carry out automated tasks,


often for malicious purposes
B) A secure network designed to protect against cyber threats
C) A method used to monitor user activities on a network
D) A form of encryption for securing data in transit

Answer: A) A network of infected devices controlled by cybercriminals to carry out


automated tasks, often for malicious purposes

95. What does the term "physical security" in cybersecurity refer to?

A) Protecting the organization’s network from unauthorized digital access


B) Protecting physical devices, systems, and networks from theft, damage, or unauthorized
access
C) Using encryption to secure sensitive data from hackers
D) Implementing strong passwords and multi-factor authentication

Answer: B) Protecting physical devices, systems, and networks from theft, damage, or
unauthorized access

96. What does "DNS hijacking" involve?

A) Intercepting and modifying DNS requests to redirect users to malicious websites


B) Redirecting all network traffic to a secure server for monitoring
C) Encrypting DNS records to prevent unauthorized access
D) Using DNS to mask the IP addresses of malicious actors

Answer: A) Intercepting and modifying DNS requests to redirect users to malicious websites

97. What is the purpose of a "keylogger" in a cybersecurity attack?

A) To encrypt sensitive files for ransom


B) To track keystrokes and capture sensitive information like passwords and login credentials
C) To inject malicious code into websites
D) To monitor and block unauthorized network traffic

Answer: B) To track keystrokes and capture sensitive information like passwords and login
credentials

98. Which of the following best describes the term "cyber resilience"?

A) The ability of a system to recover from a cyberattack or disruption


B) The process of continuously monitoring network traffic for anomalies
C) The method of preventing all cyberattacks from ever occurring
D) The use of cryptographic techniques to secure user credentials

Answer: A) The ability of a system to recover from a cyberattack or disruption

99. What is "data encryption at rest"?

A) Encrypting data while it is being transmitted over the internet


B) Encrypting data when it is stored on physical devices or servers
C) Encrypting data only when it is accessed by unauthorized users
D) Encrypting passwords before they are stored in the system

Answer: B) Encrypting data when it is stored on physical devices or servers

100. What is the purpose of an "incident response plan" in cybersecurity?

A) To identify and patch software vulnerabilities in real-time


B) To ensure that all users follow secure password policies
C) To provide a structured approach for responding to cybersecurity incidents and
minimizing damage
D) To monitor network traffic for potential threats

Answer: C) To provide a structured approach for responding to cybersecurity incidents and


minimizing damage

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy