Chapters 1~5 MCQ Flashcards

1
Q

What is Cybersecurity?

A) Protecting physical assets from theft

B) Protecting networked systems and data from unauthorized use or harm

C) Managing social media accounts

D) Creating software applications

A

B) Protecting networked systems and data from unauthorized use or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of personal data?

A) Company financial reports

B) Social security number

C) Organizational patents

D) Government defense secrets

A

B) Social security number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of identity theft?

A) To gain unauthorized access to a company’s network

B) To steal money or commit fraud using someone else’s identity

C) To disrupt government operations

D) To spread malware

A

B) To steal money or commit fraud using someone else’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a type of organizational data?

A) Transactional data

B) Intellectual property

C) Personal social media posts

D) Financial data

A

C) Personal social media posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three dimensions of the Cube security model?

A) Confidentiality, Integrity, Availability

B) Encryption, Authentication, Authorization

C) Firewalls, Antivirus, VPNs

D) Data, Networks, Devices

A

A) Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of malware is designed to hold a computer system or data captive until a payment is made?

A) Spyware

B) Ransomware

C) Adware

D) Rootkit

A

B) Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary goal of a Denial-of-Service (DoS) attack?

A) To steal sensitive data

B) To overwhelm a network or system, making it unavailable to users

C) To encrypt files and demand a ransom

D) To spread malware

A

B) To overwhelm a network or system, making it unavailable to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an example of social engineering?

A) Sending a phishing email

B) Exploiting a software vulnerability

C) Using a brute-force attack

D) Distributing a botnet

A

A) Sending a phishing email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a botnet?

A) A type of malware that encrypts files

B) A network of infected computers controlled by a hacker

C) A tool used to scan for open ports

D) A type of firewall

A

B) A network of infected computers controlled by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a characteristic of an Advanced Persistent Threat (APT)?

A) It is a short-term attack

B) It is carried out by amateur hackers

C) It is a long-term, targeted attack often funded by organizations or nations

D) It is used to spread adware

A

C) It is a long-term, targeted attack often funded by organizations or nations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of encryption?

A) To prevent data from being intercepted

B) To convert information into a form that unauthorized parties cannot read

C) To delete data permanently

D) To create backups of data

A

B) To convert information into a form that unauthorized parties cannot read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the strongest password?

A) 12345

B) Password123

C) M$uI9r5#bX

D) qwerty

A

C) M$uI9r5#bX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main risk of using public Wi-Fi?

A) Slow internet speed

B) Exposure to malware

C) Data interception by hackers

D) Limited bandwidth

A

C) Data interception by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a recommended practice for securing a wireless network?

A) Using the default SSID and password

B) Enabling WPA2 encryption

C) Disabling all security features

D) Broadcasting the SSID publicly

A

B) Enabling WPA2 encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a VPN?

A) To increase internet speed

B) To encrypt data and provide secure access to a network

C) To block malware

D) To create backups of data

A

B) To encrypt data and provide secure access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a function of a firewall?

A) To encrypt data

B) To filter network traffic and block malicious behavior

C) To create backups of data

D) To scan for open ports

A

B) To filter network traffic and block malicious behavior

17
Q

What is the purpose of an Intrusion Prevention System (IPS)?

A) To encrypt data

B) To block malicious traffic based on predefined signatures

C) To create backups of data

D) To manage user access control

A

B) To block malicious traffic based on predefined signatures

18
Q

Which of the following is an example of symmetric encryption?

A) RSA

B) AES

C) Diffie-Hellman

D) ECC

19
Q

What is the primary purpose of multi-factor authentication?

A) To increase internet speed

B) To provide an additional layer of security by requiring multiple forms of verification

C) To encrypt data

D) To block malware

A

B) To provide an additional layer of security by requiring multiple forms of verification

20
Q

Which of the following is NOT a type of access control?

A) Physical

B) Logical

C) Administrative

D) Financial

A

D) Financial

21
Q

What is the purpose of a hashing algorithm?

A) To encrypt data

B) To ensure data integrity by producing a fixed-length hash value

C) To create backups of data

D) To block malicious traffic

A

B) To ensure data integrity by producing a fixed-length hash value

22
Q

Which of the following is a popular hashing algorithm?

A) RSA

B) MD5

C) AES

D) DES

23
Q

What does “Five Nines” refer to in high availability?

A) 99.999% uptime

B) 95% uptime

C) 90% uptime

D) 85% uptime

A

A) 99.999% uptime

24
Q

Which of the following is a method to improve availability?

A) Using weak passwords

B) Implementing redundancy

C) Disabling firewalls

D) Ignoring software updates

A

B) Implementing redundancy

25
Q

What is the purpose of RAID (Redundant Array of Independent Disks)?

A) To increase internet speed

B) To provide data redundancy and improve performance

C) To encrypt data

D) To block malware

A

B) To provide data redundancy and improve performance