CyberSecurity Introduction
CyberSecurity Introduction
5. What is the process of converting data into an unreadable format to protect it from
unauthorized access?
- a) Authentication
- b) Encryption
- c) Decryption
- d) Hacking
- Correct answer: b) Encryption
6. Which cybersecurity principle focuses on ensuring that authorized users have access to
information when needed?
- a) Integrity
- b) Availability
- c) Confidentiality
- d) Non-repudiation
- Correct answer: b) Availability
9. Which term refers to the practice of attempting to gain unauthorized access to systems or
networks to find vulnerabilities?
- a) Ethical hacking
- b) Phishing
- c) Data mining
- d) Spamming
- Correct answer: a) Ethical hacking