Online Exam Quiz

questionQuestion  1 to 30

What is a 'keylogger'?

  • A tool to log keystrokes
  • A type of encryption
  • A firewall feature
  • A network monitoring tool
Mark for review

What does the term 'zero-day' refer to in cybersecurity?

  • A type of firewall
  • A vulnerability unknown to the vendor
  • An encryption algorithm
  • A backup method
Mark for review

What is 'encryption'?

  • Converting plaintext to ciphertext
  • Converting data to an image
  • Compressing data
  • Storing data in the cloud
Mark for review

What is 'a patch' in cybersecurity?

  • A type of encryption
  • An update to fix software vulnerabilities
  • A method to secure communication
  • A type of virus
Mark for review

Which type of malware is designed to spread without human intervention?

  • Virus
  • Worm
  • Trojan
  • Ransomware
Mark for review

What is the primary function of an antivirus software?

  • To backup data
  • To encrypt data
  • To protect against malware
  • To monitor network traffic
Mark for review

What is a 'honeypot' in cybersecurity?

  • A type of malware
  • A security vulnerability
  • A decoy system to attract attackers
  • A type of encryption
Mark for review

What does SSL stand for in cybersecurity?

  • Secure Sockets Layer
  • Secure System Login
  • System Security Layer
  • Secure System Link
Mark for review

Which of the following is an example of a strong password?

  • 123456
  • password
  • Pa$$w0rd!
  • abcdef
Mark for review

What is a 'firewall' in cybersecurity?

  • A software to enhance computer speed
  • A hardware device only
  • A software or hardware that filters incoming and outgoing traffic
  • A type of malware
Mark for review

What is 'ransomware'?

  • A malware that encrypts files and demands payment for decryption
  • A type of firewall
  • A network security protocol
  • A type of antivirus software
Mark for review

What is a DDoS attack?

  • An attack to gain physical access to a server
  • An attack to distribute malware
  • An attack to overwhelm network resources
  • An attack to decrypt sensitive information
Mark for review

Which of the following is not a type of cybersecurity threat?

  • Phishing
  • Hacking
  • Virus
  • Encryption
Mark for review

What is the purpose of a VPN in cybersecurity?

  • To speed up internet
  • To bypass ISP restrictions
  • To provide a secure connection over the internet
  • To hack into networks
Mark for review

What does 'HTTPS' stand for?

  • Hypertext Transfer Protocol Secure
  • Hypertext Transfer Protocol Standard
  • High Text Transfer Protocol Security
  • Hyperlink Transfer Protocol Security
Mark for review

What does the acronym 'MFA' stand for in cybersecurity?

  • Multiple Function Authorization
  • Multi-Factor Authentication
  • Multi-Form Access
  • Multiple Factor Access
Mark for review

What does the acronym 'IDS' stand for?

  • Intrusion Detection System
  • Information Detection System
  • Integrated Data Security
  • Internet Data Security
Mark for review

Which of the following is a technique used to protect data?

  • Hacking
  • Encryption
  • Phishing
  • DDoS attack
Mark for review

What is SQL injection?

  • A technique to inject SQL commands
  • A method of data backup
  • A way to update databases
  • A network encryption method
Mark for review

What is the function of an Intrusion Detection System (IDS)?

  • To prevent data breaches
  • To detect unauthorized access
  • To encrypt data
  • To provide multi-factor authentication
Mark for review

What is 'adware'?

  • A type of software that displays advertisements
  • A type of encryption tool
  • A type of firewall
  • A type of antivirus software
Mark for review

What is the main purpose of a firewall?

  • To block all incoming traffic
  • To protect against malware
  • To monitor and control incoming and outgoing network traffic
  • To enhance system performance
Mark for review

What is the primary goal of a social engineering attack?

  • To hack into networks
  • To deceive people into revealing information
  • To install malware
  • To block access to resources
Mark for review

What is 'WPA2'?

  • A type of malware
  • A wireless security protocol
  • A network monitoring tool
  • An encryption algorithm
Mark for review

What is 'malware'?

  • A type of software designed to harm
  • A software update
  • An email spam
  • A network protocol
Mark for review

What is the function of 'cryptography'?

  • To write secure code
  • To secure communication
  • To encrypt and decrypt data
  • To create strong passwords
Mark for review

What does the acronym VPN stand for?

  • Virtual Private Network
  • Virtual Public Network
  • Visual Private Network
  • Visual Public Network
Mark for review

What is the full form of 'CIA' in cybersecurity?

  • Central Intelligence Agency
  • Confidentiality, Integrity, Availability
  • Control, Integrity, Availability
  • Cybersecurity Information Agency
Mark for review

What is 'Two-Factor Authentication'?

  • An encryption method
  • A way to recover passwords
  • A method that requires two forms of identification
  • A type of firewall
Mark for review

What does 'HTTPS' ensure?

  • Faster browsing speed
  • Secure communication over the web
  • Anonymity on the web
  • Data compression
Mark for review

blinkerOnline

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • Answered
  • Not Answered
  • Marked for Review