Cybersecurity MCQ Questions PDF

Document Details

RiskFreeMedusa5224

Uploaded by RiskFreeMedusa5224

Tags

cybersecurity multiple choice questions information security computer security

Summary

This document is a collection of multiple-choice questions (MCQs) focused on cybersecurity topics. It includes questions on various aspects of cybersecurity like VPNs, firewalls, social engineering attacks and malware. This is helpful for reviewing or learning cybersecurity concepts.

Full Transcript

Cybersecurity Multiple-Choice Questions (MCQs) ============================================== This document contains 30 multiple-choice questions (MCQs) on cybersecurity. Each question has four options (A, B, C, D), and the correct answer is provided in the last column. Question...

Cybersecurity Multiple-Choice Questions (MCQs) ============================================== This document contains 30 multiple-choice questions (MCQs) on cybersecurity. Each question has four options (A, B, C, D), and the correct answer is provided in the last column. Question Option A Option B Option C Option D Correct Answer ----------------------------------------------------------------------------------- ------------------------------------------------------------------- ----------------------------------------------------------------- -------------------------------------------------------------------- ------------------------------------- ---------------- What does the acronym \'VPN\' stand for? Virtual Private Network Virtual Public Network Virtual Protected Network Virtual Personal Network A Which of the following is an example of a strong password? password123 123456 P\@ssw0rd!2025 admin C What is the primary purpose of a firewall? Encrypt data Block unauthorized access Detect malware Backup data B What type of attack involves overwhelming a system with traffic? Phishing Denial of Service (DoS) Man-in-the-Middle SQL Injection B Which of these is a common form of social engineering? Brute force attack Phishing email Keylogger Malware B What does \'HTTPS\' stand for? HyperText Transfer Protocol Secure HyperText Transfer Protocol Simple HyperText Transfer Protocol Standard HyperText Transfer Protocol Service A Which of the following is a type of malware? Firewall Antivirus Ransomware VPN C What is the purpose of two-factor authentication (2FA)? To encrypt data To provide an additional layer of security To block malware To backup data B What is phishing? A type of malware An attempt to steal sensitive information via email or websites A method of encrypting data A type of firewall B What is the main goal of ransomware? To steal passwords To encrypt files and demand payment for decryption To monitor user activity To block internet access B What is a brute force attack? An attempt to guess passwords by trying all possible combinations An attack that floods a system with traffic An attack that steals sensitive information An attack that installs malware A What is the purpose of a digital certificate? To encrypt data To verify the identity of a website or user To detect malware To backup data B What is a zero-day vulnerability? A vulnerability that has been patched A vulnerability that is publicly known A vulnerability that is exploited before it is known to the vendor A vulnerability that is harmless C What is the role of an Intrusion Detection System (IDS)? To block unauthorized access To detect and alert on potential security breaches To encrypt data To backup data B What is the purpose of a honeypot in cybersecurity? To attract and trap attackers To encrypt sensitive data To block malware To backup data A What is the main function of antivirus software? To detect and remove malware To encrypt data To block unauthorized access To backup data A What is the term for unauthorized access to a computer system? Hacking Phishing Malware Encryption A What is the purpose of encryption? To make data unreadable to unauthorized users To detect malware To block unauthorized access To backup data A What is a botnet? A network of infected computers controlled by an attacker A type of firewall A method of encryption A type of antivirus software A What is the purpose of a penetration test? To test the strength of a system\'s security To encrypt data To detect malware To backup data A What is a Trojan horse in cybersecurity? A type of malware disguised as legitimate software A method of encryption A type of firewall A type of antivirus software A What is the purpose of a security patch? To fix vulnerabilities in software To encrypt data To detect malware To backup data A What is the term for an attack that intercepts communication between two parties? Man-in-the-Middle attack Phishing Brute force attack SQL Injection A What is the purpose of a Virtual Private Network (VPN)? To encrypt internet traffic and protect privacy To detect malware To block unauthorized access To backup data A What is the term for software that secretly gathers user information? Spyware Ransomware Adware Trojan horse A What is the purpose of a CAPTCHA? To verify that a user is human To encrypt data To detect malware To backup data A What is the term for an attack that exploits a database vulnerability? SQL Injection Phishing Brute force attack Man-in-the-Middle attack A What is the purpose of a security audit? To assess the effectiveness of security measures To encrypt data To detect malware To backup data A What is the term for a fake website designed to steal user information? Phishing site Honeypot Botnet Firewall A What is the purpose of a backup? To create a copy of data for recovery in case of loss To encrypt data To detect malware To block unauthorized access A

Use Quizgecko on...
Browser
Browser