B.To protect systems, networks, and programs from digital attacks
C.To generate data for marketing
D.To monitor employee productivity
Correct Answer: To protect systems, networks, and programs from digital attacks
Explanation:Cybersecurity involves the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
Incorrect! Try again.
2Which of the following components make up the CIA Triad in information security?
Explanation:The CIA Triad stands for Confidentiality, Integrity, and Availability, which are the three pillars of information security.
Incorrect! Try again.
3Ensuring that data is not altered or tampered with by unauthorized entities refers to which element of the CIA Triad?
A.Confidentiality
B.Integrity
C.Availability
D.Authentication
Correct Answer: Integrity
Explanation:Integrity ensures the accuracy and completeness of data, meaning it hasn't been modified in an unauthorized manner.
Incorrect! Try again.
4If a website is taken down by a hacker and becomes inaccessible to users, which aspect of the CIA Triad is violated?
A.Confidentiality
B.Integrity
C.Availability
D.Non-repudiation
Correct Answer: Availability
Explanation:Availability ensures that information and resources are available to authorized users when needed. A site takedown violates this.
Incorrect! Try again.
5Which of the following best describes an Insider Threat?
A.A hacker from another country attacking a database
B.A malware infection from a phishing email
C.A current or former employee misusing their access privileges
D.A zero-day exploit found in software
Correct Answer: A current or former employee misusing their access privileges
Explanation:Insider threats originate from individuals within the organization, such as employees, former employees, contractors, or business associates, who have inside information concerning the organization's security practices, data, and computer systems.
Incorrect! Try again.
6What is Malware?
A.Hardware designed to secure data
B.Software designed to disrupt, damage, or gain unauthorized access
C.A person who fixes computer bugs
D.A type of network cable
Correct Answer: Software designed to disrupt, damage, or gain unauthorized access
Explanation:Malware, short for malicious software, is intrusive software that is designed to damage and destroy computers and computer systems.
Incorrect! Try again.
7Which type of malware disguises itself as legitimate software to trick users into installing it?
A.Worm
B.Trojan Horse
C.Adware
D.Ransomware
Correct Answer: Trojan Horse
Explanation:A Trojan Horse is a type of malware that masquerades as legitimate code or software to deceive a user into loading and executing it.
Incorrect! Try again.
8What distinguishes a Worm from a Virus?
A.A worm requires a host file to spread
B.A worm encrypts files
C.A worm can replicate itself without human interaction
D.A worm is only found on mobile devices
Correct Answer: A worm can replicate itself without human interaction
Explanation:Unlike viruses, which require the spreading of an infected host file, Worms are standalone software that can replicate and spread across networks without human intervention.
Incorrect! Try again.
9Which attack involves an attacker sending fraudulent emails claiming to be from a reputable company to induce individuals to reveal personal information?
A.Phishing
B.DDoS
C.SQL Injection
D.Man-in-the-Middle
Correct Answer: Phishing
Explanation:Phishing is a social engineering attack often used to steal user data, including login credentials and credit card numbers, by masquerading as a trusted entity.
Incorrect! Try again.
10What is Spear Phishing?
A.Phishing meant for the general public
B.A targeted phishing attempt aimed at a specific individual or organization
C.Phishing done via voice calls
D.Phishing done via SMS
Correct Answer: A targeted phishing attempt aimed at a specific individual or organization
Explanation:Spear phishing is a potent variation of phishing that targets specific individuals or groups, often using personalized information to increase credibility.
Incorrect! Try again.
11In the context of Social Engineering, what is Pretexting?
A.Following someone into a secure area
B.Creating a fabricated scenario to obtain information
C.Looking over someone's shoulder to see their password
D.Searching through trash for documents
Correct Answer: Creating a fabricated scenario to obtain information
Explanation:Pretexting involves an attacker creating a fake identity or scenario (a pretext) to manipulate a victim into providing private information.
Incorrect! Try again.
12Which type of attack attempts to guess a password by trying every possible combination of characters?
A.Phishing
B.Brute-force attack
C.SQL Injection
D.Cross-Site Scripting
Correct Answer: Brute-force attack
Explanation:A Brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. It tries all combinations, theoretically where is the character set size and is the length.
Incorrect! Try again.
13What is a Dictionary Attack?
A.Attacking a physical library
B.Using a list of common words and phrases to guess passwords
C.Intercepting network traffic
D.Overloading a server with requests
Correct Answer: Using a list of common words and phrases to guess passwords
Explanation:A Dictionary Attack is a form of brute-force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a likely list of words.
Incorrect! Try again.
14What does DoS stand for in cybersecurity?
A.Disk Operating System
B.Denial of Service
C.Data over Security
D.Digital output Signal
Correct Answer: Denial of Service
Explanation:Denial of Service (DoS) attacks differ from other hacking activities; their goal is to shut down a machine or network, making it inaccessible to its intended users.
Incorrect! Try again.
15How does a DDoS (Distributed Denial of Service) attack differ from a standard DoS attack?
A.It uses a single computer to attack
B.It targets data integrity instead of availability
C.It uses a network of multiple infected devices (botnet) to attack
D.It is slower than a DoS attack
Correct Answer: It uses a network of multiple infected devices (botnet) to attack
Explanation:A DDoS attack uses multiple compromised computer systems (a botnet) as sources of attack traffic, making it harder to block than a simple DoS from a single source.
Incorrect! Try again.
16What is a Zero-day attack?
A.An attack that takes 0 days to execute
B.An attack that exploits a vulnerability unknown to the software vendor
C.An attack that occurs at midnight
D.An attack aimed at resetting a system to day zero
Correct Answer: An attack that exploits a vulnerability unknown to the software vendor
Explanation:A Zero-day vulnerability is a software flaw that is unknown to the vendor. A Zero-day attack occurs when hackers exploit this flaw before the developers have a chance to create a patch.
Incorrect! Try again.
17Which type of malware encrypts a victim's files and demands payment for the decryption key?
A.Spyware
B.Ransomware
C.Adware
D.Rootkit
Correct Answer: Ransomware
Explanation:Ransomware is a type of malware that threatens to publish the victim's data or perpetually block access to it (usually by encryption) unless a ransom is paid.
Incorrect! Try again.
18The WannaCry incident in 2017 is a famous example of which type of cyber attack?
A.Phishing campaign
B.Ransomware attack
C.DDoS attack
D.SQL Injection
Correct Answer: Ransomware attack
Explanation:WannaCry was a worldwide Ransomware crypto-worm attack that targeted computers running the Microsoft Windows operating system by encrypting data and demanding Bitcoin payment.
Incorrect! Try again.
19What is a Digital Footprint?
A.The physical weight of a computer
B.The trail of data you create while using the Internet
C.A security tool for tracking hackers
D.A biometric scanning method
Correct Answer: The trail of data you create while using the Internet
Explanation:A Digital Footprint is the trail of data you leave behind while using the internet. It includes websites you visit, emails you send, and information you submit to online services.
Incorrect! Try again.
20Which of the following creates a Passive Digital Footprint?
A.Posting on social media
B.Sending an email
C.Websites collecting your IP address without your direct action
D.Filling out an online form
Correct Answer: Websites collecting your IP address without your direct action
Explanation:A Passive digital footprint is created when data is collected about the user without them actively creating it (e.g., IP logging, cookies), whereas posting on social media is an active footprint.
Incorrect! Try again.
21When browsing the web, what does the 'S' in HTTPS stand for?
A.Speed
B.Secure
C.System
D.Standard
Correct Answer: Secure
Explanation:HTTPS stands for Hypertext Transfer Protocol Secure. It uses encryption (TLS/SSL) to secure communications between the browser and the server.
Incorrect! Try again.
22Which symbol in the browser address bar indicates a secure connection?
A.A warning triangle
B.A padlock icon
C.A red shield
D.A magnifying glass
Correct Answer: A padlock icon
Explanation:A padlock icon next to the URL indicates that the connection is encrypted using HTTPS/SSL.
Incorrect! Try again.
23What is Two-Factor Authentication (2FA)?
A.Using two different passwords
B.Requiring two people to log in
C.Using two distinct forms of identification to access an account
D.Changing your password twice a year
Correct Answer: Using two distinct forms of identification to access an account
Explanation:2FA adds a layer of security by requiring two types of credentials, usually something you know (password) and something you have (mobile phone code) or are (biometrics).
Incorrect! Try again.
24Which of the following is a recommended practice for Password Security?
A.Using the same password for all accounts
B.Writing passwords on a sticky note
C.Using a complex mix of characters, numbers, and symbols
D.Sharing passwords with colleagues
Correct Answer: Using a complex mix of characters, numbers, and symbols
Explanation:Strong passwords should be long and complex (entropy), making them resistant to brute-force attacks.
Incorrect! Try again.
25What is Nmap primarily used for?
A.Editing text files
B.Network discovery and security auditing
C.Creating 3D graphics
D.Playing music
Correct Answer: Network discovery and security auditing
Explanation:Nmap (Network Mapper) is a free and open-source utility for network discovery and security auditing, often used to scan open ports and detect devices.
Incorrect! Try again.
26Which tool is widely used for Packet Analysis and capturing network traffic?
A.Photoshop
B.Wireshark
C.Excel
D.Nmap
Correct Answer: Wireshark
Explanation:Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level by capturing packets.
Incorrect! Try again.
27How do AI-based threat detection systems improve cybersecurity?
A.By physically locking server rooms
B.By replacing all human analysts
C.By analyzing patterns and anomalies to predict/detect unknown threats
D.By slowing down internet traffic
Correct Answer: By analyzing patterns and anomalies to predict/detect unknown threats
Explanation:AI and Machine Learning can analyze vast amounts of data to identify behavioral patterns and detect anomalies that indicate potential threats, even if the specific signature is unknown.
Incorrect! Try again.
28What is Social Media Security primarily concerned with?
A.Getting more likes
B.Protecting personal information and account integrity on social platforms
C.Designing better profile pictures
D.Analyzing marketing trends
Correct Answer: Protecting personal information and account integrity on social platforms
Explanation:Social media security involves setting privacy controls, recognizing scams, and protecting personal data from being harvested or misused on social platforms.
Incorrect! Try again.
29Which of the following is an example of Vishing?
A.A fake email asking for passwords
B.A phone call scam pretending to be the bank
C.A text message with a malicious link
D.A physical break-in
Correct Answer: A phone call scam pretending to be the bank
Explanation:Vishing (Voice Phishing) involves the use of telephony (voice calls) to conduct phishing attacks.
Incorrect! Try again.
30What is Smishing?
A.Phishing via SMS/Text messages
B.Phishing via small emails
C.Social engineering via social media
D.Malware for smartwatches
Correct Answer: Phishing via SMS/Text messages
Explanation:Smishing stands for SMS Phishing. It uses text messages to trick users into clicking malicious links or sharing info.
Incorrect! Try again.
31In the context of data protection, what does GDPR stand for?
A.Global Data Processing Rule
B.General Data Protection Regulation
C.General Digital Protocol Rule
D.Great Data Privacy Right
Correct Answer: General Data Protection Regulation
Explanation:The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy.
Incorrect! Try again.
32Which job role is responsible for overseeing an organization's entire security posture?
A.Web Developer
B.CISO (Chief Information Security Officer)
C.Data Entry Clerk
D.Graphic Designer
Correct Answer: CISO (Chief Information Security Officer)
Explanation:The CISO is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets are adequately protected.
Incorrect! Try again.
33What is a Penetration Tester (Ethical Hacker)?
A.A criminal who steals data
B.A professional hired to legally hack systems to find vulnerabilities
C.A software developer
D.A network administrator
Correct Answer: A professional hired to legally hack systems to find vulnerabilities
Explanation:Penetration testers, or ethical hackers, simulate cyberattacks on a company's system to identify weaknesses before malicious hackers can exploit them.
Incorrect! Try again.
34What is a Keylogger?
A.A tool to organize physical keys
B.Spyware that records keystrokes to steal passwords and data
C.A secure password manager
D.A type of antivirus
Correct Answer: Spyware that records keystrokes to steal passwords and data
Explanation:A Keylogger is a type of surveillance technology (often spyware) used to monitor and record each keystroke typed on a specific computer.
Incorrect! Try again.
35Using public Wi-Fi without a VPN exposes you to which risk?
A.Higher data usage costs
B.Man-in-the-Middle (MitM) attacks
C.Hardware failure
D.Software incompatibility
Correct Answer: Man-in-the-Middle (MitM) attacks
Explanation:Public Wi-Fi networks are often unsecure, allowing attackers to intercept data transmitted between the user and the router (MitM attack).
Incorrect! Try again.
36Which tool is commonly associated with the Metasploit Framework?
A.Spreadsheet calculation
B.Exploit development and penetration testing
C.Video editing
D.Database management
Correct Answer: Exploit development and penetration testing
Explanation:Metasploit is a penetration testing framework that makes hacking simple. It is an essential tool for many security professionals to test vulnerabilities.
Incorrect! Try again.
37What is the primary function of a Firewall?
A.To cool down the computer
B.To monitor and control incoming and outgoing network traffic
C.To speed up the internet
D.To store passwords
Correct Answer: To monitor and control incoming and outgoing network traffic
Explanation:A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Incorrect! Try again.
38Which compliance standard is specifically for the payment card industry?
A.HIPAA
B.GDPR
C.PCI DSS
D.ISO 27001
Correct Answer: PCI DSS
Explanation:PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.
Incorrect! Try again.
39What is Baiting in social engineering?
A.Leaving a physical infected device (like a USB) for a victim to find
B.Sending an email with a bait link
C.Calling a victim
D.Hacking a server directly
Correct Answer: Leaving a physical infected device (like a USB) for a victim to find
Explanation:Baiting relies on the greed or curiosity of the victim. It often involves leaving a physical device, such as a USB flash drive infected with malware, in a conspicuous place.
Incorrect! Try again.
40Which skill is NOT typically required for a cybersecurity professional?
A.Understanding of networking protocols
B.Knowledge of operating systems
C.Advanced 3D Animation
D.Problem-solving and analytical skills
Correct Answer: Advanced 3D Animation
Explanation:While specialized, 3D animation is generally not a core skill for cybersecurity. Networking, OS knowledge, and analytical skills are essential.
Incorrect! Try again.
41What is a Logic Bomb?
A.A physical explosive
B.Malicious code that activates when specific criteria are met
C.A logical error in code
D.A tool to defuse viruses
Correct Answer: Malicious code that activates when specific criteria are met
Explanation:A Logic Bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met (e.g., a specific date or time).
Incorrect! Try again.
42In a SQL Injection attack, what does the attacker inject?
A.A virus
B.Malicious SQL queries/code into inputs
C.A worm
D.HTML code
Correct Answer: Malicious SQL queries/code into inputs
Explanation:SQL Injection involves placing malicious SQL statements in web entry fields for execution (e.g., to dump the database contents).
Incorrect! Try again.
43What is the concept of Non-Repudiation?
A.Hiding your identity
B.Ensuring a party cannot deny the authenticity of their signature/message
C.Encrypting data
D.Backing up data
Correct Answer: Ensuring a party cannot deny the authenticity of their signature/message
Explanation:Non-repudiation assures that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can deny having processed the information.
Incorrect! Try again.
44Which of the following creates a strong password mathematically? ( = character set size, = length)
Explanation:The entropy or strength of a password grows exponentially with length. The complexity is determined by . Increasing length () has a greater impact than increasing the character set ().
Incorrect! Try again.
45What is the main purpose of a SOC (Security Operations Center)?
A.To sell software
B.To house the servers
C.To monitor, detect, and respond to cyber threats 24/7
D.To develop websites
Correct Answer: To monitor, detect, and respond to cyber threats 24/7
Explanation:A SOC is a facility where an information security team monitors and analyzes an organization's security posture on an ongoing basis.
Incorrect! Try again.
46Which recent supply chain attack compromised the software updates of a major IT management company?
A.SolarWinds Hack
B.WannaCry
C.Stuxnet
D.ILOVEYOU
Correct Answer: SolarWinds Hack
Explanation:The SolarWinds hack (2020) was a major supply chain attack where hackers inserted malicious code into the Orion software updates, compromising thousands of organizations.
Incorrect! Try again.
47What is Spyware?
A.Software that speeds up the PC
B.Software intended to spy on the user and collect data without consent
C.Software used by spies to communicate
D.Antivirus software
Correct Answer: Software intended to spy on the user and collect data without consent
Explanation:Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Incorrect! Try again.
48To secure email, which of the following should you avoid?
A.Using strong passwords
B.Clicking on unsolicited links or attachments
C.Using 2FA
D.Checking the sender's address carefully
Correct Answer: Clicking on unsolicited links or attachments
Explanation:Clicking on unsolicited links or attachments is a primary vector for phishing and malware infections.
Incorrect! Try again.
49What is a Botnet?
A.A robot network
B.A network of private computers infected with malicious software and controlled as a group
C.A network for trading bots
D.A fast internet connection
Correct Answer: A network of private computers infected with malicious software and controlled as a group
Explanation:A Botnet is a collection of internet-connected devices, which may include PCs, servers, and mobile devices, that are infected and controlled by a common type of malware.
Incorrect! Try again.
50Which cybersecurity role focuses on forensic investigation after a breach?
A.Penetration Tester
B.Digital Forensics Analyst
C.Network Engineer
D.Sales Manager
Correct Answer: Digital Forensics Analyst
Explanation:A Digital Forensics Analyst recovers and investigates material found in digital devices, often in relation to computer crime or cyber incidents.