Online Exam Quiz

questionQuestion  1 to 30

What is a Trojan horse in cybersecurity?

  • A security device
  • A malware disguised as legitimate software
  • A type of firewall
  • An encryption method
Mark for review

What does the term 'zero-day' refer to in cybersecurity?

  • A type of firewall
  • A vulnerability unknown to the vendor
  • An encryption algorithm
  • A backup method
Mark for review

What is 'social engineering' in the context of cybersecurity?

  • Designing secure systems
  • Manipulating people into divulging confidential information
  • Writing secure code
  • Developing antivirus programs
Mark for review

What is 'malware'?

  • A type of software designed to harm
  • A software update
  • An email spam
  • A network protocol
Mark for review

What is the primary function of a 'rootkit'?

  • To secure the operating system
  • To hide malicious activities
  • To enhance system performance
  • To encrypt data
Mark for review

What is 'public key' in cryptography?

  • A key used to sign documents
  • A key used to encrypt data
  • A key used to decrypt data
  • A key used to backup data
Mark for review

What is 'Two-Factor Authentication'?

  • An encryption method
  • A way to recover passwords
  • A method that requires two forms of identification
  • A type of firewall
Mark for review

Which of the following is a common method used to crack passwords?

  • Phishing
  • Brute force attack
  • Man-in-the-middle attack
  • SQL injection
Mark for review

What is the main purpose of encryption?

  • To compress data
  • To make data readable
  • To make data unreadable to unauthorized users
  • To backup data
Mark for review

What is a 'botnet'?

  • A network of infected computers controlled by a hacker
  • A type of encryption
  • A security protocol
  • A database management system
Mark for review

What is a 'keylogger'?

  • A tool to log keystrokes
  • A type of encryption
  • A firewall feature
  • A network monitoring tool
Mark for review

What is the purpose of multi-factor authentication?

  • To enhance user experience
  • To provide multiple usernames
  • To increase security by requiring multiple forms of verification
  • To backup data
Mark for review

What is a 'firewall' in cybersecurity?

  • A software to enhance computer speed
  • A hardware device only
  • A software or hardware that filters incoming and outgoing traffic
  • A type of malware
Mark for review

Which of the following is a technique used to protect data?

  • Hacking
  • Encryption
  • Phishing
  • DDoS attack
Mark for review

What is the function of an Intrusion Detection System (IDS)?

  • To prevent data breaches
  • To detect unauthorized access
  • To encrypt data
  • To provide multi-factor authentication
Mark for review

Which type of malware is designed to spread without human intervention?

  • Virus
  • Worm
  • Trojan
  • Ransomware
Mark for review

What does the acronym 'IDS' stand for?

  • Intrusion Detection System
  • Information Detection System
  • Integrated Data Security
  • Internet Data Security
Mark for review

What does 'TLS' stand for?

  • Transport Layer Security
  • Transfer Layer Security
  • Transaction Layer Secure
  • Transparent Layer Security
Mark for review

What is 'ransomware'?

  • A malware that encrypts files and demands payment for decryption
  • A type of firewall
  • A network security protocol
  • A type of antivirus software
Mark for review

What is the purpose of a VPN in cybersecurity?

  • To speed up internet
  • To bypass ISP restrictions
  • To provide a secure connection over the internet
  • To hack into networks
Mark for review

Which of the following is an example of a strong password?

  • 123456
  • password
  • Pa$$w0rd!
  • abcdef
Mark for review

What is 'Biometrics' in cybersecurity?

  • A type of malware
  • A data backup method
  • Authentication using physical characteristics
  • A network encryption method
Mark for review

What is a 'honeypot' in cybersecurity?

  • A type of malware
  • A security vulnerability
  • A decoy system to attract attackers
  • A type of encryption
Mark for review

Which protocol is used for secure web browsing?

  • HTTP
  • FTP
  • SSH
  • HTTPS
Mark for review

What does the acronym VPN stand for?

  • Virtual Private Network
  • Virtual Public Network
  • Visual Private Network
  • Visual Public Network
Mark for review

What is SQL injection?

  • A technique to inject SQL commands
  • A method of data backup
  • A way to update databases
  • A network encryption method
Mark for review

What is 'WPA2'?

  • A type of malware
  • A wireless security protocol
  • A network monitoring tool
  • An encryption algorithm
Mark for review

What is the main purpose of a firewall?

  • To block all incoming traffic
  • To protect against malware
  • To monitor and control incoming and outgoing network traffic
  • To enhance system performance
Mark for review

What is the full form of 'CIA' in cybersecurity?

  • Central Intelligence Agency
  • Confidentiality, Integrity, Availability
  • Control, Integrity, Availability
  • Cybersecurity Information Agency
Mark for review

What is the primary goal of a social engineering attack?

  • To hack into networks
  • To deceive people into revealing information
  • To install malware
  • To block access to resources
Mark for review

blinkerOnline

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • Answered
  • Not Answered
  • Marked for Review