Cyber Security
Cyber Security
A) It is a vulnerability that has been publicly disclosed but not yet patched
B) It is a vulnerability that is unknown to the vendor and has no patch available
C) It refers to a vulnerability that has existed for at least 30 days
D) It is a type of malware that spreads through email attachments
Answer: B) It is a vulnerability that is unknown to the vendor and has no patch available
4. Which of the following is the best way to protect sensitive data from unauthorized
access?
A) A type of attack that tricks users into giving away personal information
B) Malicious software that locks or encrypts data and demands payment for its release
C) A method of securing network traffic using encryption
D) A tool that monitors network traffic for signs of an intrusion
Answer: B) Malicious software that locks or encrypts data and demands payment for its
release
Answer: B) To hide a user's IP address and encrypt data traffic over the internet
Answer: B) To identify and fix security vulnerabilities before malicious hackers can exploit
them
13. What does the term "buffer overflow" refer to in the context of cybersecurity?
A) A type of attack that causes a system to crash by sending too much data into a buffer
B) An attempt to bypass a firewall by flooding it with packets
C) A method of encrypting sensitive data before transmission
D) A weakness in user authentication systems
Answer: A) A type of attack that causes a system to crash by sending too much data into a
buffer
14. Which of the following types of malware is designed to replicate itself and spread to
other systems without user intervention?
A) Virus
B) Trojan horse
C) Worm
D) Ransomware
Answer: C) Worm
A) The attacker intercepts and potentially alters communication between two parties
B) The attacker blocks access to a website by flooding it with traffic
C) The attacker encrypts files and demands a ransom for decryption
D) The attacker gains access to a system by exploiting a vulnerability
Answer: A) The attacker intercepts and potentially alters communication between two
parties
17. Which of the following is NOT a type of authentication factor used in multi-factor
authentication (MFA)?
A) Giving users the maximum level of access necessary to perform their tasks
B) Restricting user access to the minimum necessary to perform their duties
C) Ensuring that employees have access to all systems to improve productivity
D) Enforcing strict password policies for all users
Answer: B) Restricting user access to the minimum necessary to perform their duties
Answer: B) A system designed to lure and trap attackers, allowing security teams to study
their tactics
Answer: B) The process of ensuring all software is updated to fix known vulnerabilities
22. Which of the following is a common feature of Advanced Persistent Threats (APTs)?
A) They are random attacks with no long-term objectives
B) They involve targeted, long-term infiltration of networks by well-funded, organized
attackers
C) They rely on exploiting simple vulnerabilities
D) They are usually detected and stopped within hours
23. Which of the following best describes the function of antivirus software?
Answer: B) It scans files and programs for known malware and removes them
24. What is the most common method used for data theft in a "brute-force" attack?
25. Which of the following is the primary difference between "black hat" hackers and
"white hat" hackers?
A) Black hat hackers work for government agencies, while white hat hackers work for private
companies
B) Black hat hackers engage in malicious activities for personal gain, while white hat hackers
help improve security
C) Black hat hackers only target individuals, while white hat hackers target organizations
D) There is no difference; both work in similar ways
Answer: B) Black hat hackers engage in malicious activities for personal gain, while white
hat hackers help improve security
26. What is the main goal of a "Denial of Service" (DoS) attack?
27. Which of the following is NOT a form of authentication commonly used in multi-
factor authentication (MFA)?
29. Which of the following is the best way to protect against a "brute-force" password
attack?
Answer: B) Employ a long and complex password along with account lockout mechanisms
after several failed attempts
30. What is the primary purpose of a digital signature in cybersecurity?
Answer: B) To ensure the integrity of a message and authenticate the sender’s identity
31. Which of the following is a type of attack where malicious code is inserted into a
website to steal login credentials or spread malware to visitors?
Answer: B) The user must authenticate using two different forms of verification to access a
system
A) Zero-day attack
B) Phishing attack
C) Ransomware attack
D) Social engineering attack
34. In the context of cybersecurity, what does the term "rootkit" refer to?
A) A tool designed to detect malware in a system
B) A type of malware that hides its presence by modifying the operating system
C) A firewall configuration to block unauthorized access
D) A type of encryption used for secure communications
Answer: B) A type of malware that hides its presence by modifying the operating system
35. Which of the following is the best way to mitigate the risk of a "SQL injection"
attack?
Answer: C) Use prepared statements and parameterized queries to interact with the database
36. What is the key difference between a "virus" and a "worm" in cybersecurity?
A) A virus requires user interaction to spread, while a worm can spread autonomously
without user interaction
B) A virus is designed to steal data, while a worm is designed to destroy data
C) A virus is a type of phishing attack, while a worm is a form of DDoS attack
D) A virus spreads via email attachments, while a worm spreads via social engineering
Answer: A) A virus requires user interaction to spread, while a worm can spread
autonomously without user interaction
Answer: B) Malware that is automatically downloaded to a user’s computer when they visit a
compromised website
38. Which of the following is the main function of a "security information and event
management" (SIEM) system?
A) To perform daily backups of critical data
B) To monitor, analyze, and respond to security incidents in real-time
C) To detect and remove viruses from a network
D) To provide end-user training on security best practices
A) To attract attackers and monitor their methods without compromising real systems
B) To automatically patch security vulnerabilities in real-time
C) To perform a denial-of-service attack against malicious actors
D) To store backups of critical system data for recovery purposes
Answer: A) To attract attackers and monitor their methods without compromising real
systems
41. What does the term "social engineering" generally refer to?
A) An attack that floods a DNS server with requests to cause a denial of service
B) A method for intercepting encrypted communications between a client and a server
C) An attack that alters the DNS records of a server to redirect users to malicious websites
D) A technique used to disguise the identity of a website using fake DNS entries
Answer: C) An attack that alters the DNS records of a server to redirect users to malicious
websites
44. Which of the following is the most effective way to prevent malware from spreading
within an organization?
Answer: C) Install antivirus software and ensure regular updates and scans
A) An attack where the attacker gains higher levels of access or control over a system than
originally permitted
B) An attack that floods a network with traffic to deny service
C) An attack that steals sensitive data without gaining full access to the system
D) An attack where the attacker inserts malicious code into a website to compromise visitors
Answer: A) An attack where the attacker gains higher levels of access or control over a
system than originally permitted
A) Malicious software that encrypts data and demands payment for its release
B) Malware that secretly uses the victim's computing resources to mine cryptocurrency
C) A phishing attack aimed at stealing login credentials for cryptocurrency accounts
D) A method used to bypass firewalls by mining encrypted data packets
Answer: B) Malware that secretly uses the victim's computing resources to mine
cryptocurrency
A) The process of isolating critical systems on separate physical networks to enhance security
B) The process of encrypting data between devices in a network
C) The practice of scanning network traffic for malware
D) The division of a network into different zones to improve traffic management
50. Which of the following types of malware is designed to replicate itself and spread to
other systems without requiring user interaction?
A) Ransomware
B) Trojan horse
C) Worm
D) Adware
Answer: C) Worm
51. What is the purpose of a "VPN" (Virtual Private Network)?
A) To ensure data is securely encrypted while being transmitted over the internet
B) To monitor and block malicious web traffic
C) To perform regular backups of system data
D) To hide the IP address and maintain anonymity while browsing the internet
Answer: A) To ensure data is securely encrypted while being transmitted over the internet
52. What does the "CIA triad" stand for in the context of cybersecurity?
53. Which of the following is the main risk of using public Wi-Fi networks without
encryption?
54. Which of the following is a common method to defend against a "phishing" attack?
56. What is the primary goal of "data loss prevention" (DLP) software?
Answer: C) Securing the individual devices that connect to a network, such as computers,
mobile phones, and tablets
Answer: B) The practice of maintaining good security habits to reduce the risk of
cyberattacks
59. What is the key difference between "black hat" and "white hat" hackers?
A) Black hat hackers work legally, while white hat hackers operate illegally
B) Black hat hackers use their skills for malicious purposes, while white hat hackers use them
to improve security
C) Black hat hackers use only phishing, while white hat hackers use other techniques
D) There is no difference; both types of hackers perform the same activities
Answer: B) Black hat hackers use their skills for malicious purposes, while white hat hackers
use them to improve security
Answer: C) To protect the confidentiality of data by making it unreadable without the correct
decryption key
65. What is the most effective way to defend against "brute-force" attacks?
Answer: C) Employ strong, complex passwords and limit login attempts after a set number
of failures
Answer: A) Converting data into a format that can only be read by authorized users
69. Which of the following is the main risk of using outdated or unsupported software in
a network?
70. What is the main goal of a "Distributed Denial of Service" (DDoS) attack?
73. Which of the following is NOT a common attack vector used by cybercriminals?
A) Social engineering
B) Exploiting software vulnerabilities
C) Using strong, encrypted passwords
D) Malicious email attachments (phishing)
76. Which of the following types of malware is specifically designed to collect personal
information from a victim’s system?
A) Trojan horse
B) Keylogger
C) Worm
D) Ransomware
Answer: B) Keylogger
78. Which of the following is the main purpose of "endpoint protection" software?
Answer: B) Malware is automatically downloaded onto a user's device when they visit a
compromised website
Answer: B) Adding a random value to passwords before hashing to make them more secure
82. Which of the following is a key component of "Defense in Depth" security strategy?
Answer: B) Using multiple layers of security controls to protect systems and data
84. What does the term "backdoor" refer to in the context of cybersecurity?
Answer: B) It locks the victim’s data and demands a ransom for decryption
Answer: B) Altering the sender’s email address to make it appear as though the email is from
a trusted source
Answer: B) The process of applying software updates and fixes to systems to address
vulnerabilities
89. What is the role of an "access control list" (ACL) in cybersecurity?
Answer: B) It defines which users or systems have access to specific resources or services
A) An attacker intercepts and potentially alters communication between two parties without
their knowledge
B) An attacker floods a target system with traffic to exhaust its resources
C) An attacker hijacks a session to impersonate a user and gain unauthorized access
D) An attacker infects a system with malware to exfiltrate sensitive data
Answer: A) An attacker intercepts and potentially alters communication between two parties
without their knowledge
A) A vulnerability that is discovered but has not yet been publicly disclosed or patched
B) A vulnerability that occurs only on specific operating systems
C) A vulnerability that is always present in a system regardless of configuration
D) A vulnerability that is identified through regular software updates
Answer: A) A vulnerability that is discovered but has not yet been publicly disclosed or
patched
Answer: B) To remove malicious software (viruses, worms, etc.) from infected systems
Answer: B) It verifies the identity of a user or system through a secure token or key
95. What does the term "physical security" in cybersecurity refer to?
Answer: B) Protecting physical devices, systems, and networks from theft, damage, or
unauthorized access
Answer: A) Intercepting and modifying DNS requests to redirect users to malicious websites
Answer: B) To track keystrokes and capture sensitive information like passwords and login
credentials
98. Which of the following best describes the term "cyber resilience"?