0% found this document useful (0 votes)
16 views2 pages

CyberSecurity Introduction

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

CyberSecurity Introduction

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CyberSecurity Introduction :

1. What is the primary goal of cybersecurity?


- a) To protect physical assets
- b) To detect intrusions in physical locations
- c) To protect systems, networks, and data from digital attacks
- d) To prevent system shutdowns
- Correct answer: c) To protect systems, networks, and data from digital attacks

2. Which of the following is considered a cyber threat?


- a) A power outage
- b) A phishing email
- c) A network upgrade
- d) A software installation
- Correct answer: b) A phishing email

3. What does the term "malware" stand for?


- a) Malicious software
- b) Management software
- c) Multi-access software
- d) Machine language software
- Correct answer: a) Malicious software

4. Which of the following is a method used by hackers to gain unauthorized access to a


system?
- a) Encryption
- b) Phishing
- c) Virtualization
- d) Backup
- Correct answer: b) Phishing

5. What is the process of converting data into an unreadable format to protect it from
unauthorized access?
- a) Authentication
- b) Encryption
- c) Decryption
- d) Hacking
- Correct answer: b) Encryption

6. Which cybersecurity principle focuses on ensuring that authorized users have access to
information when needed?
- a) Integrity
- b) Availability
- c) Confidentiality
- d) Non-repudiation
- Correct answer: b) Availability

7. Which of the following is NOT a common form of cybersecurity threat?


- a) Worms
- b) Firewalls
- c) Ransomware
- d) Spyware
- Correct answer: b) Firewalls

8. What is a firewall used for in cybersecurity?


- a) To scan systems for vulnerabilities
- b) To block unauthorized access to a network
- c) To encrypt sensitive data
- d) To monitor employee activity
- Correct answer: b) To block unauthorized access to a network

9. Which term refers to the practice of attempting to gain unauthorized access to systems or
networks to find vulnerabilities?
- a) Ethical hacking
- b) Phishing
- c) Data mining
- d) Spamming
- Correct answer: a) Ethical hacking

10. What is the main purpose of multi-factor authentication (MFA)?


- a) To provide an extra layer of security by requiring multiple forms of verification
- b) To replace usernames and passwords
- c) To encrypt sensitive data
- d) To store user credentials securely
- Correct answer: a) To provide an extra layer of security by requiring multiple forms of
verification

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy