Chapters 1~5 MCQ Flashcards
What is Cybersecurity?
A) Protecting physical assets from theft
B) Protecting networked systems and data from unauthorized use or harm
C) Managing social media accounts
D) Creating software applications
B) Protecting networked systems and data from unauthorized use or harm
Which of the following is an example of personal data?
A) Company financial reports
B) Social security number
C) Organizational patents
D) Government defense secrets
B) Social security number
What is the primary goal of identity theft?
A) To gain unauthorized access to a company’s network
B) To steal money or commit fraud using someone else’s identity
C) To disrupt government operations
D) To spread malware
B) To steal money or commit fraud using someone else’s identity
Which of the following is NOT a type of organizational data?
A) Transactional data
B) Intellectual property
C) Personal social media posts
D) Financial data
C) Personal social media posts
What are the three dimensions of the Cube security model?
A) Confidentiality, Integrity, Availability
B) Encryption, Authentication, Authorization
C) Firewalls, Antivirus, VPNs
D) Data, Networks, Devices
A) Confidentiality, Integrity, Availability
Which type of malware is designed to hold a computer system or data captive until a payment is made?
A) Spyware
B) Ransomware
C) Adware
D) Rootkit
B) Ransomware
What is the primary goal of a Denial-of-Service (DoS) attack?
A) To steal sensitive data
B) To overwhelm a network or system, making it unavailable to users
C) To encrypt files and demand a ransom
D) To spread malware
B) To overwhelm a network or system, making it unavailable to users
Which of the following is an example of social engineering?
A) Sending a phishing email
B) Exploiting a software vulnerability
C) Using a brute-force attack
D) Distributing a botnet
A) Sending a phishing email
What is a botnet?
A) A type of malware that encrypts files
B) A network of infected computers controlled by a hacker
C) A tool used to scan for open ports
D) A type of firewall
B) A network of infected computers controlled by a hacker
Which of the following is a characteristic of an Advanced Persistent Threat (APT)?
A) It is a short-term attack
B) It is carried out by amateur hackers
C) It is a long-term, targeted attack often funded by organizations or nations
D) It is used to spread adware
C) It is a long-term, targeted attack often funded by organizations or nations
What is the primary purpose of encryption?
A) To prevent data from being intercepted
B) To convert information into a form that unauthorized parties cannot read
C) To delete data permanently
D) To create backups of data
B) To convert information into a form that unauthorized parties cannot read
Which of the following is the strongest password?
A) 12345
B) Password123
C) M$uI9r5#bX
D) qwerty
C) M$uI9r5#bX
What is the main risk of using public Wi-Fi?
A) Slow internet speed
B) Exposure to malware
C) Data interception by hackers
D) Limited bandwidth
C) Data interception by hackers
Which of the following is a recommended practice for securing a wireless network?
A) Using the default SSID and password
B) Enabling WPA2 encryption
C) Disabling all security features
D) Broadcasting the SSID publicly
B) Enabling WPA2 encryption
What is the purpose of a VPN?
A) To increase internet speed
B) To encrypt data and provide secure access to a network
C) To block malware
D) To create backups of data
B) To encrypt data and provide secure access to a network
Which of the following is a function of a firewall?
A) To encrypt data
B) To filter network traffic and block malicious behavior
C) To create backups of data
D) To scan for open ports
B) To filter network traffic and block malicious behavior
What is the purpose of an Intrusion Prevention System (IPS)?
A) To encrypt data
B) To block malicious traffic based on predefined signatures
C) To create backups of data
D) To manage user access control
B) To block malicious traffic based on predefined signatures
Which of the following is an example of symmetric encryption?
A) RSA
B) AES
C) Diffie-Hellman
D) ECC
B) AES
What is the primary purpose of multi-factor authentication?
A) To increase internet speed
B) To provide an additional layer of security by requiring multiple forms of verification
C) To encrypt data
D) To block malware
B) To provide an additional layer of security by requiring multiple forms of verification
Which of the following is NOT a type of access control?
A) Physical
B) Logical
C) Administrative
D) Financial
D) Financial
What is the purpose of a hashing algorithm?
A) To encrypt data
B) To ensure data integrity by producing a fixed-length hash value
C) To create backups of data
D) To block malicious traffic
B) To ensure data integrity by producing a fixed-length hash value
Which of the following is a popular hashing algorithm?
A) RSA
B) MD5
C) AES
D) DES
B) MD5
What does “Five Nines” refer to in high availability?
A) 99.999% uptime
B) 95% uptime
C) 90% uptime
D) 85% uptime
A) 99.999% uptime
Which of the following is a method to improve availability?
A) Using weak passwords
B) Implementing redundancy
C) Disabling firewalls
D) Ignoring software updates
B) Implementing redundancy
What is the purpose of RAID (Redundant Array of Independent Disks)?
A) To increase internet speed
B) To provide data redundancy and improve performance
C) To encrypt data
D) To block malware
B) To provide data redundancy and improve performance