CYBER SECURITY
1. What does the term "phishing" refer to in cybersecurity?
A) A method of intercepting data between two systems
B) A form of attack that attempts to steal sensitive information by pretending to be a
trustworthy entity
C) A way to encrypt data for secure communication
D) A technique for backing up data to a secure location
Answer: B) A form of attack that attempts to steal sensitive information by pretending to be
a trustworthy entity
2. Which of the following is a characteristic of a "zero-day" vulnerability?
A) It is a vulnerability that has been publicly disclosed but not yet patched
B) It is a vulnerability that is unknown to the vendor and has no patch available
C) It refers to a vulnerability that has existed for at least 30 days
D) It is a type of malware that spreads through email attachments
Answer: B) It is a vulnerability that is unknown to the vendor and has no patch available
3. What is the main purpose of a firewall in network security?
A) To monitor and analyze network traffic for suspicious activity
B) To authenticate users before granting access to the system
C) To prevent unauthorized access to or from a private network
D) To encrypt all data sent over the network
Answer: C) To prevent unauthorized access to or from a private network
4. Which of the following is the best way to protect sensitive data from unauthorized
access?
A) Use strong, complex passwords and change them regularly
B) Share your passwords with trusted colleagues to improve collaboration
C) Disable all security software to improve system performance
D) Avoid using encryption to keep data access simple
Answer: A) Use strong, complex passwords and change them regularly
5. What does the term "ransomware" refer to?
A) A type of attack that tricks users into giving away personal information
B) Malicious software that locks or encrypts data and demands payment for its release
C) A method of securing network traffic using encryption
D) A tool that monitors network traffic for signs of an intrusion
Answer: B) Malicious software that locks or encrypts data and demands payment for its
release
6. Which of the following is an example of "social engineering"?
A) A hacker exploiting a software vulnerability
B) An attacker using malware to gain access to a system
C) An attacker manipulating individuals into divulging confidential information
D) A network administrator configuring a firewall to block malicious traffic
Answer: C) An attacker manipulating individuals into divulging confidential information
7. What is the main function of multi-factor authentication (MFA)?
A) It encrypts communication between two parties
B) It requires multiple forms of identity verification to grant access to a system
C) It protects against phishing attacks
D) It monitors user activity to detect suspicious behavior
Answer: B) It requires multiple forms of identity verification to grant access to a system
8. What is the purpose of a VPN (Virtual Private Network)?
A) To monitor and block malicious website traffic
B) To hide a user's IP address and encrypt data traffic over the internet
C) To scan for malware in files before they are opened
D) To store backup copies of important files in the cloud
Answer: B) To hide a user's IP address and encrypt data traffic over the internet
9. Which of the following is a common method used in Distributed Denial of Service
(DDoS) attacks?
A) Encrypting data and demanding payment for its release
B) Overloading a server with traffic to make it unavailable to users
C) Trick users into giving away their login credentials
D) Infecting a network with a worm that spreads automatically
Answer: B) Overloading a server with traffic to make it unavailable to users
10. What is the primary goal of ethical hacking?
A) To exploit security flaws for personal gain
B) To identify and fix security vulnerabilities before malicious hackers can exploit them
C) To steal confidential information for intelligence purposes
D) To create viruses and test antivirus software
Answer: B) To identify and fix security vulnerabilities before malicious hackers can exploit
them
11. What is the purpose of encryption in cybersecurity?
A) To prevent unauthorized access to sensitive information by converting it into unreadable
data
B) To detect unauthorized access attempts to a system
C) To ensure the integrity of a message
D) To monitor and log network traffic
Answer: A) To prevent unauthorized access to sensitive information by converting it into
unreadable data
12. Which of the following is an example of "insider threat"?
A) A hacker exploiting a vulnerability in a system
B) A malware infection caused by downloading a malicious attachment
C) A company employee stealing sensitive company data
D) A Distributed Denial of Service (DDoS) attack
Answer: C) A company employee stealing sensitive company data
13. What does the term "buffer overflow" refer to in the context of cybersecurity?
A) A type of attack that causes a system to crash by sending too much data into a buffer
B) An attempt to bypass a firewall by flooding it with packets
C) A method of encrypting sensitive data before transmission
D) A weakness in user authentication systems
Answer: A) A type of attack that causes a system to crash by sending too much data into a
buffer
14. Which of the following types of malware is designed to replicate itself and spread to
other systems without user intervention?
A) Virus
B) Trojan horse
C) Worm
D) Ransomware
Answer: C) Worm
15. Which of the following is a key characteristic of a "man-in-the-middle" (MitM)
attack?
A) The attacker intercepts and potentially alters communication between two parties
B) The attacker blocks access to a website by flooding it with traffic
C) The attacker encrypts files and demands a ransom for decryption
D) The attacker gains access to a system by exploiting a vulnerability
Answer: A) The attacker intercepts and potentially alters communication between two
parties
16. What is the role of an Intrusion Detection System (IDS)?
A) To encrypt data during transmission
B) To monitor network traffic and detect signs of malicious activity
C) To authenticate users before they access a system
D) To block access to untrusted websites
Answer: B) To monitor network traffic and detect signs of malicious activity
17. Which of the following is NOT a type of authentication factor used in multi-factor
authentication (MFA)?
A) Something you know (password)
B) Something you have (smartphone)
C) Something you are (fingerprint)
D) Something you see (screen lock pattern)
Answer: D) Something you see (screen lock pattern)
18. What is "SQL injection"?
A) A type of malware that modifies database entries
B) A technique used to bypass firewalls and access databases
C) A code injection technique that exploits vulnerabilities in web applications to execute
malicious SQL queries
D) A method of extracting data from a database without permission
Answer: C) A code injection technique that exploits vulnerabilities in web applications to
execute malicious SQL queries
19. What does the principle of "least privilege" mean in cybersecurity?
A) Giving users the maximum level of access necessary to perform their tasks
B) Restricting user access to the minimum necessary to perform their duties
C) Ensuring that employees have access to all systems to improve productivity
D) Enforcing strict password policies for all users
Answer: B) Restricting user access to the minimum necessary to perform their duties
20. What is a "honeypot" in cybersecurity?
A) A device that automatically blocks malware from entering a network
B) A system designed to lure and trap attackers, allowing security teams to study their tactics
C) A software program that detects and removes viruses from a system
D) A tool used to encrypt communication between two parties
Answer: B) A system designed to lure and trap attackers, allowing security teams to study
their tactics
21. What does the term "patch management" refer to?
A) The process of backing up software to prevent data loss
B) The process of ensuring all software is updated to fix known vulnerabilities
C) The process of encrypting data stored on a system
D) The process of auditing network traffic for unauthorized access
Answer: B) The process of ensuring all software is updated to fix known vulnerabilities
22. Which of the following is a common feature of Advanced Persistent Threats (APTs)?
A) They are random attacks with no long-term objectives
B) They involve targeted, long-term infiltration of networks by well-funded, organized
attackers
C) They rely on exploiting simple vulnerabilities
D) They are usually detected and stopped within hours
Answer: B) They involve targeted, long-term infiltration of networks by well-funded,
organized attackers
23. Which of the following best describes the function of antivirus software?
A) It encrypts all data on a system to ensure confidentiality
B) It scans files and programs for known malware and removes them
C) It tracks all network activity to detect unusual behavior
D) It sets up firewalls to block incoming threats
Answer: B) It scans files and programs for known malware and removes them
24. What is the most common method used for data theft in a "brute-force" attack?
A) Intercepting data through a man-in-the-middle attack
B) Trying many different combinations of usernames and passwords to gain unauthorized
access
C) Sending a virus to corrupt system files
D) Stealing physical hardware from a target location
Answer: B) Trying many different combinations of usernames and passwords to gain
unauthorized access
25. Which of the following is the primary difference between "black hat" hackers and
"white hat" hackers?
A) Black hat hackers work for government agencies, while white hat hackers work for private
companies
B) Black hat hackers engage in malicious activities for personal gain, while white hat hackers
help improve security
C) Black hat hackers only target individuals, while white hat hackers target organizations
D) There is no difference; both work in similar ways
Answer: B) Black hat hackers engage in malicious activities for personal gain, while white
hat hackers help improve security
26. What is the main goal of a "Denial of Service" (DoS) attack?
A) To steal sensitive data from a target system
B) To overwhelm a system with traffic, making it unavailable to users
C) To install malware on a system to collect information
D) To intercept communications between two systems
Answer: B) To overwhelm a system with traffic, making it unavailable to users
27. Which of the following is NOT a form of authentication commonly used in multi-
factor authentication (MFA)?
A) Biometric verification (fingerprint, retina scan)
B) A one-time password (OTP) sent via SMS or email
C) Passwords that are shared among multiple users
D) A physical token or smart card
Answer: C) Passwords that are shared among multiple users
28. What is "social engineering" in the context of cybersecurity?
A) An attack that exploits vulnerabilities in software applications
B) Manipulating individuals into revealing confidential information by exploiting
psychological weaknesses
C) A method of encrypting data before transmission
D) A process of creating strong passwords to prevent unauthorized access
Answer: B) Manipulating individuals into revealing confidential information by exploiting
psychological weaknesses
29. Which of the following is the best way to protect against a "brute-force" password
attack?
A) Use simple and easy-to-remember passwords
B) Employ a long and complex password along with account lockout mechanisms after
several failed attempts
C) Avoid using two-factor authentication
D) Use the same password across multiple accounts for convenience
Answer: B) Employ a long and complex password along with account lockout mechanisms
after several failed attempts
30. What is the primary purpose of a digital signature in cybersecurity?
A) To encrypt a file so that only the recipient can read it
B) To ensure the integrity of a message and authenticate the sender’s identity
C) To mask the sender’s identity during email communication
D) To scan a message for potential malware
Answer: B) To ensure the integrity of a message and authenticate the sender’s identity
31. Which of the following is a type of attack where malicious code is inserted into a
website to steal login credentials or spread malware to visitors?
A) Cross-Site Scripting (XSS)
B) Phishing
C) Man-in-the-middle attack
D) SQL injection
Answer: A) Cross-Site Scripting (XSS)
32. What does the term "two-factor authentication" (2FA) mean?
A) The user must change their password every 30 days
B) The user must authenticate using two different forms of verification to access a system
C) The user’s identity is verified using a fingerprint and a password
D) The user must authenticate once with a password and a backup PIN code
Answer: B) The user must authenticate using two different forms of verification to access a
system
33. Which of the following types of attacks relies on exploiting vulnerabilities in a
system that have not been patched or updated?
A) Zero-day attack
B) Phishing attack
C) Ransomware attack
D) Social engineering attack
Answer: A) Zero-day attack
34. In the context of cybersecurity, what does the term "rootkit" refer to?
A) A tool designed to detect malware in a system
B) A type of malware that hides its presence by modifying the operating system
C) A firewall configuration to block unauthorized access
D) A type of encryption used for secure communications
Answer: B) A type of malware that hides its presence by modifying the operating system
35. Which of the following is the best way to mitigate the risk of a "SQL injection"
attack?
A) Use strong passwords for database access
B) Encrypt all data stored in the database
C) Use prepared statements and parameterized queries to interact with the database
D) Disable JavaScript on the website
Answer: C) Use prepared statements and parameterized queries to interact with the database
36. What is the key difference between a "virus" and a "worm" in cybersecurity?
A) A virus requires user interaction to spread, while a worm can spread autonomously
without user interaction
B) A virus is designed to steal data, while a worm is designed to destroy data
C) A virus is a type of phishing attack, while a worm is a form of DDoS attack
D) A virus spreads via email attachments, while a worm spreads via social engineering
Answer: A) A virus requires user interaction to spread, while a worm can spread
autonomously without user interaction
37. Which of the following describes a "drive-by download"?
A) A legitimate software update automatically downloaded by a user's computer
B) Malware that is automatically downloaded to a user’s computer when they visit a
compromised website
C) A form of phishing attack that involves downloading malicious attachments
D) A type of spyware that tracks a user’s movements online
Answer: B) Malware that is automatically downloaded to a user’s computer when they visit a
compromised website
38. Which of the following is the main function of a "security information and event
management" (SIEM) system?
A) To perform daily backups of critical data
B) To monitor, analyze, and respond to security incidents in real-time
C) To detect and remove viruses from a network
D) To provide end-user training on security best practices
Answer: B) To monitor, analyze, and respond to security incidents in real-time
39. Which of the following is an example of "data exfiltration"?
A) Encrypting data to ensure it is protected during transmission
B) Sending sensitive data from an organization's network to an unauthorized third party
C) Blocking access to a specific website to prevent data leakage
D) Detecting and preventing malware from entering a system
Answer: B) Sending sensitive data from an organization's network to an unauthorized third
party
40. Which of the following is a common use of a "honeypot" in cybersecurity?
A) To attract attackers and monitor their methods without compromising real systems
B) To automatically patch security vulnerabilities in real-time
C) To perform a denial-of-service attack against malicious actors
D) To store backups of critical system data for recovery purposes
Answer: A) To attract attackers and monitor their methods without compromising real
systems
41. What does the term "social engineering" generally refer to?
A) Technical measures to protect against cyberattacks
B) Manipulating people into revealing confidential information or performing certain actions
C) Encryption techniques used to secure data
D) Building social networks to collaborate on cybersecurity efforts
Answer: B) Manipulating people into revealing confidential information or performing
certain actions
42. What is "DNS spoofing" (also known as "DNS cache poisoning")?
A) An attack that floods a DNS server with requests to cause a denial of service
B) A method for intercepting encrypted communications between a client and a server
C) An attack that alters the DNS records of a server to redirect users to malicious websites
D) A technique used to disguise the identity of a website using fake DNS entries
Answer: C) An attack that alters the DNS records of a server to redirect users to malicious
websites
43. What is the primary function of a "sandbox" in cybersecurity?
A) To store sensitive data securely
B) To isolate and analyze potentially malicious files in a controlled environment
C) To block unauthorized websites from being accessed
D) To prevent data breaches by encrypting sensitive files
Answer: B) To isolate and analyze potentially malicious files in a controlled environment
44. Which of the following is the most effective way to prevent malware from spreading
within an organization?
A) Disable all external devices, including USB drives
B) Use a VPN to encrypt all network traffic
C) Install antivirus software and ensure regular updates and scans
D) Only allow employees to access the internet during working hours
Answer: C) Install antivirus software and ensure regular updates and scans
45. What is a "Privilege Escalation" attack?
A) An attack where the attacker gains higher levels of access or control over a system than
originally permitted
B) An attack that floods a network with traffic to deny service
C) An attack that steals sensitive data without gaining full access to the system
D) An attack where the attacker inserts malicious code into a website to compromise visitors
Answer: A) An attack where the attacker gains higher levels of access or control over a
system than originally permitted
46. What is the primary function of a "public key" in asymmetric encryption?
A) To encrypt data before it is transmitted
B) To decrypt data that has been encrypted with the corresponding private key
C) To securely store passwords in a hash format
D) To verify the identity of the sender
Answer: B) To decrypt data that has been encrypted with the corresponding private key
47. Which of the following is a characteristic of "cryptojacking"?
A) Malicious software that encrypts data and demands payment for its release
B) Malware that secretly uses the victim's computing resources to mine cryptocurrency
C) A phishing attack aimed at stealing login credentials for cryptocurrency accounts
D) A method used to bypass firewalls by mining encrypted data packets
Answer: B) Malware that secretly uses the victim's computing resources to mine
cryptocurrency
48. Which of the following is the best definition of "network segmentation"?
A) The process of isolating critical systems on separate physical networks to enhance security
B) The process of encrypting data between devices in a network
C) The practice of scanning network traffic for malware
D) The division of a network into different zones to improve traffic management
Answer: A) The process of isolating critical systems on separate physical networks to
enhance security
49. What is a "hash function" used for in cybersecurity?
A) To encrypt data for secure transmission
B) To verify the integrity of data by generating a unique value (hash)
C) To monitor network traffic for malicious activity
D) To securely store passwords by transforming them into unreadable data
Answer: B) To verify the integrity of data by generating a unique value (hash)
50. Which of the following types of malware is designed to replicate itself and spread to
other systems without requiring user interaction?
A) Ransomware
B) Trojan horse
C) Worm
D) Adware
Answer: C) Worm
51. What is the purpose of a "VPN" (Virtual Private Network)?
A) To ensure data is securely encrypted while being transmitted over the internet
B) To monitor and block malicious web traffic
C) To perform regular backups of system data
D) To hide the IP address and maintain anonymity while browsing the internet
Answer: A) To ensure data is securely encrypted while being transmitted over the internet
52. What does the "CIA triad" stand for in the context of cybersecurity?
A) Confidentiality, Integrity, and Accessibility
B) Control, Identification, and Authentication
C) Cryptography, Integrity, and Authentication
D) Confidentiality, Integrity, and Availability
Answer: D) Confidentiality, Integrity, and Availability
53. Which of the following is the main risk of using public Wi-Fi networks without
encryption?
A) Data could be intercepted by attackers, compromising sensitive information
B) The network could be automatically connected to by malicious devices
C) It could result in slower internet speeds and unreliable connections
D) The Wi-Fi network may automatically block certain websites
Answer: A) Data could be intercepted by attackers, compromising sensitive information
54. Which of the following is a common method to defend against a "phishing" attack?
A) Encrypt all communication between parties
B) Use an email filter to detect suspicious messages
C) Disable JavaScript in web browsers
D) Use a unique password for each account
Answer: B) Use an email filter to detect suspicious messages
55. What does the acronym "RAT" stand for in cybersecurity?
A) Remote Access Trojan
B) Real-time Authentication Tool
C) Root Access Trojan
D) Rapid Attack Technique
Answer: A) Remote Access Trojan
56. What is the primary goal of "data loss prevention" (DLP) software?
A) To monitor and restrict unauthorized access to sensitive data
B) To encrypt data before transmission
C) To detect and remove malicious software
D) To block all incoming network traffic
Answer: A) To monitor and restrict unauthorized access to sensitive data
57. What does the term "endpoint security" refer to?
A) Protection for servers, routers, and switches in a network
B) Securing network communication channels using firewalls and encryption
C) Securing the individual devices that connect to a network, such as computers, mobile
phones, and tablets
D) Protecting the physical hardware from theft and damage
Answer: C) Securing the individual devices that connect to a network, such as computers,
mobile phones, and tablets
58. What is "cyber hygiene"?
A) Regularly backing up data to prevent loss
B) The practice of maintaining good security habits to reduce the risk of cyberattacks
C) Scanning emails for malware attachments
D) Using firewalls to protect network traffic
Answer: B) The practice of maintaining good security habits to reduce the risk of
cyberattacks
59. What is the key difference between "black hat" and "white hat" hackers?
A) Black hat hackers work legally, while white hat hackers operate illegally
B) Black hat hackers use their skills for malicious purposes, while white hat hackers use them
to improve security
C) Black hat hackers use only phishing, while white hat hackers use other techniques
D) There is no difference; both types of hackers perform the same activities
Answer: B) Black hat hackers use their skills for malicious purposes, while white hat hackers
use them to improve security
60. What is the primary goal of "data encryption" in cybersecurity?
A) To reduce the size of data for faster transmission
B) To ensure that data is not modified or corrupted during transfer
C) To protect the confidentiality of data by making it unreadable without the correct
decryption key
D) To speed up the process of accessing and sharing data
Answer: C) To protect the confidentiality of data by making it unreadable without the correct
decryption key
61. What is the main purpose of an "Intrusion Prevention System" (IPS)?
A) To identify vulnerabilities in a network
B) To monitor network traffic and block potential threats in real-time
C) To manage user authentication and access control
D) To scan emails for malware
Answer: B) To monitor network traffic and block potential threats in real-time
62. What is "data masking"?
A) Encrypting data to make it unreadable
B) Hiding sensitive data by replacing it with fictitious data in a non-production environment
C) Obfuscating data during transmission to prevent interception
D) Storing data in a secure location to protect it from unauthorized access
Answer: B) Hiding sensitive data by replacing it with fictitious data in a non-production
environment
63. What does "penetration testing" (pen testing) involve?
A) Monitoring network traffic for malicious behavior
B) Exploiting known vulnerabilities to identify weaknesses in a system or network
C) Blocking unauthorized users from accessing a network
D) Encrypting communication channels to secure data
Answer: B) Exploiting known vulnerabilities to identify weaknesses in a system or network
64. What is the purpose of a "hashing" algorithm?
A) To encrypt data for secure transmission
B) To verify the integrity of data by converting it into a fixed-size string of characters
C) To authenticate users based on their biometric data
D) To generate random passwords for secure access
Answer: B) To verify the integrity of data by converting it into a fixed-size string of
characters
65. What is the most effective way to defend against "brute-force" attacks?
A) Use short, simple passwords to make them easier to remember
B) Use CAPTCHA to prevent automated password attempts
C) Employ strong, complex passwords and limit login attempts after a set number of failures
D) Disable multi-factor authentication (MFA)
Answer: C) Employ strong, complex passwords and limit login attempts after a set number
of failures
66. Which of the following is a characteristic of a "Trojan horse" malware?
A) It spreads autonomously from system to system
B) It masquerades as legitimate software to trick users into installing it
C) It encrypts files and demands a ransom for decryption
D) It blocks access to websites by flooding them with traffic
Answer: B) It masquerades as legitimate software to trick users into installing it
67. What is the primary function of a "firewall" in network security?
A) To monitor and log user activity on a network
B) To prevent unauthorized access to or from a private network by filtering traffic
C) To store backup copies of critical files
D) To detect and remove viruses from a system
Answer: B) To prevent unauthorized access to or from a private network by filtering traffic
68. What does the term "data encryption" refer to?
A) Converting data into a format that can only be read by authorized users
B) Storing data in an external location for backup purposes
C) Compressing data to reduce file size
D) Making data publicly accessible for sharing purposes
Answer: A) Converting data into a format that can only be read by authorized users
69. Which of the following is the main risk of using outdated or unsupported software in
a network?
A) Increased system performance
B) The risk of security vulnerabilities that may be exploited by attackers
C) Decreased need for patch management
D) Reduced administrative costs
Answer: B) The risk of security vulnerabilities that may be exploited by attackers
70. What is the main goal of a "Distributed Denial of Service" (DDoS) attack?
A) To steal login credentials and personal information
B) To block access to a system by overwhelming it with traffic from multiple sources
C) To inject malicious code into a website
D) To gain unauthorized access to a system by exploiting a vulnerability
Answer: B) To block access to a system by overwhelming it with traffic from multiple
sources
71. Which of the following is the primary purpose of using "SSL/TLS" in
cybersecurity?
A) To encrypt email communication
B) To provide secure communication over a network (typically the internet) by encrypting
data during transmission
C) To authenticate user credentials
D) To filter out malicious traffic in a network
Answer: B) To provide secure communication over a network (typically the internet) by
encrypting data during transmission
72. What is "two-factor authentication" (2FA)?
A) A method of verifying a user's identity using two separate passwords
B) A process that combines two different forms of authentication to improve security
C) A technique for verifying the integrity of network traffic
D) A tool for encrypting all communication in real-time
Answer: B) A process that combines two different forms of authentication to improve
security
73. Which of the following is NOT a common attack vector used by cybercriminals?
A) Social engineering
B) Exploiting software vulnerabilities
C) Using strong, encrypted passwords
D) Malicious email attachments (phishing)
Answer: C) Using strong, encrypted passwords
74. What is "social engineering" in the context of a phishing attack?
A) Using technical exploits to gain unauthorized access to systems
B) Manipulating individuals into revealing confidential information or performing certain
actions
C) Encrypting sensitive data to prevent unauthorized access
D) Installing a rootkit on a system to steal user credentials
Answer: B) Manipulating individuals into revealing confidential information or performing
certain actions
75. What is the purpose of a "patch" in cybersecurity?
A) To increase system performance and reduce system errors
B) To fix security vulnerabilities or bugs in software applications
C) To block unauthorized users from accessing a network
D) To ensure secure communication over a network
Answer: B) To fix security vulnerabilities or bugs in software applications
76. Which of the following types of malware is specifically designed to collect personal
information from a victim’s system?
A) Trojan horse
B) Keylogger
C) Worm
D) Ransomware
Answer: B) Keylogger
77. What does the term "data breach" refer to?
A) The process of securing a system against unauthorized access
B) An event where sensitive or confidential data is accessed or disclosed without
authorization
C) The unauthorized modification of a system or file
D) The detection of unauthorized devices connecting to a network
Answer: B) An event where sensitive or confidential data is accessed or disclosed without
authorization
78. Which of the following is the main purpose of "endpoint protection" software?
A) To protect the data in transit between devices
B) To secure individual devices (e.g., computers, smartphones) connected to a network
C) To monitor network traffic for suspicious activity
D) To enforce strong password policies for users
Answer: B) To secure individual devices (e.g., computers, smartphones) connected to a
network
79. Which of the following is a common method of preventing unauthorized access to a
computer system?
A) Implementing multi-factor authentication (MFA)
B) Disabling all antivirus software
C) Using only weak, easily memorable passwords
D) Allowing guest accounts for all users
Answer: A) Implementing multi-factor authentication (MFA)
80. Which of the following describes a "drive-by download" attack?
A) An attacker manually infects a system by physically accessing it
B) Malware is automatically downloaded onto a user's device when they visit a compromised
website
C) An attacker sends a phishing email with a malicious link
D) A piece of software that monitors network traffic and steals credentials
Answer: B) Malware is automatically downloaded onto a user's device when they visit a
compromised website
81. What is "salting" in password hashing?
A) Encrypting passwords with a random value before storing them
B) Adding a random value to passwords before hashing to make them more secure
C) Storing passwords in plain text but encrypting them during transmission
D) Generating a new password each time a user logs in
Answer: B) Adding a random value to passwords before hashing to make them more secure
82. Which of the following is a key component of "Defense in Depth" security strategy?
A) Relying on a single security measure to protect the network
B) Using multiple layers of security controls to protect systems and data
C) Employing social engineering to trick attackers into revealing their plans
D) Focusing only on perimeter defense, such as firewalls and intrusion detection systems
Answer: B) Using multiple layers of security controls to protect systems and data
83. What is the primary function of "multi-factor authentication" (MFA)?
A) To increase password complexity
B) To combine multiple methods of user verification for added security
C) To simplify user login processes
D) To reduce network traffic and improve performance
Answer: B) To combine multiple methods of user verification for added security
84. What does the term "backdoor" refer to in the context of cybersecurity?
A) A feature used to provide legitimate access to a system
B) A hidden method of gaining unauthorized access to a system
C) A type of firewall that blocks external threats
D) A tool used for testing network performance
Answer: B) A hidden method of gaining unauthorized access to a system
85. Which of the following is a typical behavior of "ransomware"?
A) It spreads by sending malicious attachments in emails
B) It locks the victim’s data and demands a ransom for decryption
C) It secretly mines cryptocurrency using the victim's resources
D) It collects sensitive data and sends it to attackers without the victim’s knowledge
Answer: B) It locks the victim’s data and demands a ransom for decryption
86. What is "whaling" in the context of cybersecurity?
A) A type of phishing attack targeting high-level executives or important individuals
B) A method of flooding a website with traffic to cause a denial of service
C) An attack that uses fake security certificates to steal personal information
D) A type of ransomware that specifically targets government agencies
Answer: A) A type of phishing attack targeting high-level executives or important
individuals
87. What is "email spoofing"?
A) Sending unsolicited emails to many users in a short time
B) Altering the sender’s email address to make it appear as though the email is from a trusted
source
C) Encrypting emails to prevent interception
D) Blocking email messages with malicious attachments
Answer: B) Altering the sender’s email address to make it appear as though the email is from
a trusted source
88. What does "patch management" refer to?
A) The process of creating backup copies of critical data
B) The process of applying software updates and fixes to systems to address vulnerabilities
C) The process of securing network traffic using encryption
D) The technique of monitoring and blocking malicious traffic
Answer: B) The process of applying software updates and fixes to systems to address
vulnerabilities
89. What is the role of an "access control list" (ACL) in cybersecurity?
A) It monitors the content of files for any suspicious activity
B) It defines which users or systems have access to specific resources or services
C) It encrypts data to ensure confidentiality during transmission
D) It logs system activity for auditing and compliance purposes
Answer: B) It defines which users or systems have access to specific resources or services
90. What is a "man-in-the-middle" (MITM) attack?
A) An attacker intercepts and potentially alters communication between two parties without
their knowledge
B) An attacker floods a target system with traffic to exhaust its resources
C) An attacker hijacks a session to impersonate a user and gain unauthorized access
D) An attacker infects a system with malware to exfiltrate sensitive data
Answer: A) An attacker intercepts and potentially alters communication between two parties
without their knowledge
91. What is "zero-day vulnerability"?
A) A vulnerability that is discovered but has not yet been publicly disclosed or patched
B) A vulnerability that occurs only on specific operating systems
C) A vulnerability that is always present in a system regardless of configuration
D) A vulnerability that is identified through regular software updates
Answer: A) A vulnerability that is discovered but has not yet been publicly disclosed or
patched
92. Which of the following is the purpose of an "anti-virus" software?
A) To monitor network traffic for suspicious behavior
B) To remove malicious software (viruses, worms, etc.) from infected systems
C) To encrypt data during transmission
D) To control access to network resources based on user roles
Answer: B) To remove malicious software (viruses, worms, etc.) from infected systems
93. What is the role of an "authentication token" in cybersecurity?
A) It ensures that data transmitted between two systems remains confidential
B) It verifies the identity of a user or system through a secure token or key
C) It scans for malware and malicious code in emails and files
D) It secures backup data in the cloud
Answer: B) It verifies the identity of a user or system through a secure token or key
94. Which of the following is a "botnet"?
A) A network of infected devices controlled by cybercriminals to carry out automated tasks,
often for malicious purposes
B) A secure network designed to protect against cyber threats
C) A method used to monitor user activities on a network
D) A form of encryption for securing data in transit
Answer: A) A network of infected devices controlled by cybercriminals to carry out
automated tasks, often for malicious purposes
95. What does the term "physical security" in cybersecurity refer to?
A) Protecting the organization’s network from unauthorized digital access
B) Protecting physical devices, systems, and networks from theft, damage, or unauthorized
access
C) Using encryption to secure sensitive data from hackers
D) Implementing strong passwords and multi-factor authentication
Answer: B) Protecting physical devices, systems, and networks from theft, damage, or
unauthorized access
96. What does "DNS hijacking" involve?
A) Intercepting and modifying DNS requests to redirect users to malicious websites
B) Redirecting all network traffic to a secure server for monitoring
C) Encrypting DNS records to prevent unauthorized access
D) Using DNS to mask the IP addresses of malicious actors
Answer: A) Intercepting and modifying DNS requests to redirect users to malicious websites
97. What is the purpose of a "keylogger" in a cybersecurity attack?
A) To encrypt sensitive files for ransom
B) To track keystrokes and capture sensitive information like passwords and login credentials
C) To inject malicious code into websites
D) To monitor and block unauthorized network traffic
Answer: B) To track keystrokes and capture sensitive information like passwords and login
credentials
98. Which of the following best describes the term "cyber resilience"?
A) The ability of a system to recover from a cyberattack or disruption
B) The process of continuously monitoring network traffic for anomalies
C) The method of preventing all cyberattacks from ever occurring
D) The use of cryptographic techniques to secure user credentials
Answer: A) The ability of a system to recover from a cyberattack or disruption
99. What is "data encryption at rest"?
A) Encrypting data while it is being transmitted over the internet
B) Encrypting data when it is stored on physical devices or servers
C) Encrypting data only when it is accessed by unauthorized users
D) Encrypting passwords before they are stored in the system
Answer: B) Encrypting data when it is stored on physical devices or servers
100. What is the purpose of an "incident response plan" in cybersecurity?
A) To identify and patch software vulnerabilities in real-time
B) To ensure that all users follow secure password policies
C) To provide a structured approach for responding to cybersecurity incidents and
minimizing damage
D) To monitor network traffic for potential threats
Answer: C) To provide a structured approach for responding to cybersecurity incidents and
minimizing damage