Cybersecurity Basics Quiz
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a common method used to protect against SQL injection attacks?

  • Encryption
  • Input validation (correct)
  • Antivirus software
  • Firewalls
  • What is the primary purpose of a VPN?

  • To provide secure remote access (correct)
  • To monitor network traffic
  • To manage network devices
  • To encrypt data
  • Which of the following is a type of malware that replicates itself and spreads to other computers?

  • Spyware
  • Worm (correct)
  • Virus
  • Trojan
  • What is the purpose of two-factor authentication (2FA)?

    <p>To provide an additional layer of security</p> Signup and view all the answers

    Which of the following is a common method used to protect against brute force attacks?

    <p>Strong passwords</p> Signup and view all the answers

    What does the acronym IDS stand for?

    <p>Intrusion Detection System</p> Signup and view all the answers

    Which of the following is a type of attack that involves injecting malicious code into a website?

    <p>Cross-site scripting</p> Signup and view all the answers

    What is the primary purpose of a digital signature?

    <p>To authenticate the identity of a user or device</p> Signup and view all the answers

    What is the primary purpose of a firewall?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    Which of the following is a type of malware that disguises itself as legitimate software?

    <p>Trojan</p> Signup and view all the answers

    What does the acronym VPN stand for?

    <p>Virtual Private Network</p> Signup and view all the answers

    Which protocol is used to securely transfer files over the internet?

    <p>SFTP</p> Signup and view all the answers

    What is the main function of an intrusion detection system (IDS)?

    <p>To detect and alert on suspicious activity</p> Signup and view all the answers

    Which of the following is a common method used in phishing attacks?

    <p>Sending malicious emails</p> Signup and view all the answers

    What is the purpose of a digital certificate?

    <p>To authenticate the identity of a user or device</p> Signup and view all the answers

    What does the acronym DDoS stand for?

    <p>Distributed Denial of Service</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser