Latest Update | 2024/2025 | Rated A+
Which of the following is a type of malware that encrypts files and demands ransom?
A) Trojan
B) Virus
C) Ransomware
D) Worm
✔✔ C) Ransomware
What does the acronym "VPN" stand for?
A) Virtual Private Network
B) Variable Protocol Network
C) Verified Public Network
D) Virtual Public Node
✔✔ A) Virtual Private Network
What is the role of a firewall in network security?
A) To enhance user experience
1
,B) To monitor and control incoming and outgoing network traffic
C) To store sensitive data
D) To perform backup operations
✔✔ B) To monitor and control incoming and outgoing network traffic
Which of the following techniques is used to gather information about a target?
A) Penetration testing
B) Reconnaissance
C) Cryptanalysis
D) Encryption
✔✔ B) Reconnaissance
What type of attack attempts to overwhelm a server with excessive requests?
A) Man-in-the-middle attack
B) Denial-of-Service attack
C) Phishing attack
D) SQL injection
✔✔ B) Denial-of-Service attack
2
,Which protocol is commonly used to secure communications over the internet?
A) HTTP
B) SMTP
C) FTP
D) HTTPS
✔✔ D) HTTPS
What is an example of social engineering?
A) Installing malware
B) Sending a phishing email
C) Performing a network scan
D) Using encryption
✔✔ B) Sending a phishing email
What does "SQL injection" aim to exploit?
A) Network bandwidth
B) Database vulnerabilities
3
, C) User authentication
D) Firewall settings
✔✔ B) Database vulnerabilities
What is the main function of a vulnerability scanner?
A) To prevent attacks
B) To identify weaknesses in systems and networks
C) To encrypt sensitive information
D) To monitor network performance
✔✔ B) To identify weaknesses in systems and networks
Which of the following is a tool used for packet analysis?
A) Nmap
B) Metasploit
C) Wireshark
D) Nessus
✔✔ C) Wireshark
4