Online Exam Quiz

questionQuestion  1 to 30

What is the function of an Intrusion Detection System (IDS)?

  • To prevent data breaches
  • To detect unauthorized access
  • To encrypt data
  • To provide multi-factor authentication
Mark for review

What does SSL stand for in cybersecurity?

  • Secure Sockets Layer
  • Secure System Login
  • System Security Layer
  • Secure System Link
Mark for review

What is the primary function of an antivirus software?

  • To backup data
  • To encrypt data
  • To protect against malware
  • To monitor network traffic
Mark for review

What is 'encryption'?

  • Converting plaintext to ciphertext
  • Converting data to an image
  • Compressing data
  • Storing data in the cloud
Mark for review

What is 'Spyware'?

  • A type of firewall
  • A tool to protect privacy
  • Malware that spies on user activities
  • A network security protocol
Mark for review

What does the acronym 'DoS' stand for in cybersecurity?

  • Denial of Security
  • Denial of Service
  • Download of Security
  • Data over Service
Mark for review

Which of the following is an example of a strong password?

  • 123456
  • password
  • Pa$$w0rd!
  • abcdef
Mark for review

What is 'malware'?

  • A type of software designed to harm
  • A software update
  • An email spam
  • A network protocol
Mark for review

What is 'Two-Factor Authentication'?

  • An encryption method
  • A way to recover passwords
  • A method that requires two forms of identification
  • A type of firewall
Mark for review

What is a 'firewall' in cybersecurity?

  • A software to enhance computer speed
  • A hardware device only
  • A software or hardware that filters incoming and outgoing traffic
  • A type of malware
Mark for review

What is a 'keylogger'?

  • A tool to log keystrokes
  • A type of encryption
  • A firewall feature
  • A network monitoring tool
Mark for review

What does the acronym 'MFA' stand for in cybersecurity?

  • Multiple Function Authorization
  • Multi-Factor Authentication
  • Multi-Form Access
  • Multiple Factor Access
Mark for review

What is 'pharming'?

  • A form of malware
  • Redirecting users to fake websites
  • Encrypting data
  • A type of phishing
Mark for review

Which of the following is not a type of cybersecurity threat?

  • Phishing
  • Hacking
  • Virus
  • Encryption
Mark for review

What does 'TLS' stand for?

  • Transport Layer Security
  • Transfer Layer Security
  • Transaction Layer Secure
  • Transparent Layer Security
Mark for review

What is a Trojan horse in cybersecurity?

  • A security device
  • A malware disguised as legitimate software
  • A type of firewall
  • An encryption method
Mark for review

What is a DDoS attack?

  • An attack to gain physical access to a server
  • An attack to distribute malware
  • An attack to overwhelm network resources
  • An attack to decrypt sensitive information
Mark for review

What does the acronym VPN stand for?

  • Virtual Private Network
  • Virtual Public Network
  • Visual Private Network
  • Visual Public Network
Mark for review

What is the purpose of a digital certificate in cybersecurity?

  • To encrypt data
  • To authenticate the identity of the certificate holder
  • To secure a network
  • To create a backup
Mark for review

What is the primary function of a 'rootkit'?

  • To secure the operating system
  • To hide malicious activities
  • To enhance system performance
  • To encrypt data
Mark for review

What is 'penetration testing'?

  • A method to scan for viruses
  • A technique to recover lost data
  • A process to test the security of systems by simulating attacks
  • A way to encrypt data
Mark for review

What is 'a patch' in cybersecurity?

  • A type of encryption
  • An update to fix software vulnerabilities
  • A method to secure communication
  • A type of virus
Mark for review

Which of the following is a common method used to crack passwords?

  • Phishing
  • Brute force attack
  • Man-in-the-middle attack
  • SQL injection
Mark for review

What is the purpose of a VPN in cybersecurity?

  • To speed up internet
  • To bypass ISP restrictions
  • To provide a secure connection over the internet
  • To hack into networks
Mark for review

What is 'WPA2'?

  • A type of malware
  • A wireless security protocol
  • A network monitoring tool
  • An encryption algorithm
Mark for review

What is the purpose of multi-factor authentication?

  • To enhance user experience
  • To provide multiple usernames
  • To increase security by requiring multiple forms of verification
  • To backup data
Mark for review

Which of the following is a technique used to protect data?

  • Hacking
  • Encryption
  • Phishing
  • DDoS attack
Mark for review

What is the primary goal of a social engineering attack?

  • To hack into networks
  • To deceive people into revealing information
  • To install malware
  • To block access to resources
Mark for review

What does 'HTTPS' stand for?

  • Hypertext Transfer Protocol Secure
  • Hypertext Transfer Protocol Standard
  • High Text Transfer Protocol Security
  • Hyperlink Transfer Protocol Security
Mark for review

What is 'social engineering' in the context of cybersecurity?

  • Designing secure systems
  • Manipulating people into divulging confidential information
  • Writing secure code
  • Developing antivirus programs
Mark for review

blinkerOnline

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • Answered
  • Not Answered
  • Marked for Review