Cybersecurity Basics Quiz
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a common method used to protect against SQL injection attacks?

  • Encryption
  • Input validation (correct)
  • Antivirus software
  • Firewalls

What is the primary purpose of a VPN?

  • To provide secure remote access (correct)
  • To monitor network traffic
  • To manage network devices
  • To encrypt data

Which of the following is a type of malware that replicates itself and spreads to other computers?

  • Spyware
  • Worm (correct)
  • Virus
  • Trojan

What is the purpose of two-factor authentication (2FA)?

<p>To provide an additional layer of security (A)</p> Signup and view all the answers

Which of the following is a common method used to protect against brute force attacks?

<p>Strong passwords (A)</p> Signup and view all the answers

What does the acronym IDS stand for?

<p>Intrusion Detection System (B)</p> Signup and view all the answers

Which of the following is a type of attack that involves injecting malicious code into a website?

<p>Cross-site scripting (D)</p> Signup and view all the answers

What is the primary purpose of a digital signature?

<p>To authenticate the identity of a user or device (B)</p> Signup and view all the answers

What is the primary purpose of a firewall?

<p>To prevent unauthorized access (D)</p> Signup and view all the answers

Which of the following is a type of malware that disguises itself as legitimate software?

<p>Trojan (B)</p> Signup and view all the answers

What does the acronym VPN stand for?

<p>Virtual Private Network (C)</p> Signup and view all the answers

Which protocol is used to securely transfer files over the internet?

<p>SFTP (B)</p> Signup and view all the answers

What is the main function of an intrusion detection system (IDS)?

<p>To detect and alert on suspicious activity (A)</p> Signup and view all the answers

Which of the following is a common method used in phishing attacks?

<p>Sending malicious emails (C)</p> Signup and view all the answers

What is the purpose of a digital certificate?

<p>To authenticate the identity of a user or device (B)</p> Signup and view all the answers

What does the acronym DDoS stand for?

<p>Distributed Denial of Service (A)</p> Signup and view all the answers

Flashcards

Firewall purpose

A firewall prevents unauthorized access to a network.

Trojan definition

A type of malware disguised as legitimate software.

VPN acronym

Virtual Private Network, a secure connection to a network.

Secure file transfer protocol

SFTP is a secure way to move files online.

Signup and view all the flashcards

Intrusion Detection System (IDS) function

Identifies suspicious activity on a network.

Signup and view all the flashcards

Phishing attack method

Sending deceptive emails to trick victims.

Signup and view all the flashcards

Digital certificate purpose

Verifies the identity of a user or device.

Signup and view all the flashcards

Man-in-the-middle attack type

Attack that intercepts and alters communication.

Signup and view all the flashcards

SQL Injection Attack Protection

Methods used to prevent malicious code from being inserted into SQL queries.

Signup and view all the flashcards

VPN Purpose

A VPN creates a secure connection for remote access to a private network, encrypting data in transit.

Signup and view all the flashcards

Malware Type: Virus

Self-replicating malicious software that spreads to other computers.

Signup and view all the flashcards

Two-Factor Authentication (2FA)

An extra layer of security that requires more than one verification method (e.g., password + code).

Signup and view all the flashcards

Brute Force Attack Protection

Using strong passwords to prevent attackers from trying numerous combinations until accessing the target.

Signup and view all the flashcards

IDS Meaning

Intrusion Detection System, a system that detects malicious activities on a network.

Signup and view all the flashcards

Cross-Site Scripting (XSS)

An attack that involves injecting malicious code into a website, often to steal data or harm the website.

Signup and view all the flashcards

Digital Signature Purpose

Verifying the authenticity of a user or device by providing proof of identity.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser