Practice Questions and Answers | Latest
Version | 2024/2025 | 100% Pass
What is the primary function of a firewall?
A) To prevent unauthorized access
B) To encrypt data
C) To monitor network traffic
D) To back up data
✔✔ A) To prevent unauthorized access
Which of the following is an example of social engineering?
A) Using a vulnerability scanner
B) Sending phishing emails
C) Conducting a penetration test
D) Installing antivirus software
✔✔ B) Sending phishing emails
What does the term "buffer overflow" refer to?
1
,A) A type of denial-of-service attack
B) An attack that exploits memory allocation
C) A method to encrypt data
D) A type of firewall rule
✔✔ B) An attack that exploits memory allocation
Which of the following tools is commonly used for network scanning?
A) Wireshark
B) Nmap
C) Metasploit
D) Nessus
✔✔ B) Nmap
What is the purpose of a VPN (Virtual Private Network)?
A) To hide malware
B) To create a secure connection over the internet
C) To block network traffic
D) To perform vulnerability scans
2
,✔✔ B) To create a secure connection over the internet
Which attack involves intercepting and altering communications between two parties?
A) SQL injection
B) Cross-site scripting
C) Man-in-the-middle attack
D) Phishing
✔✔ C) Man-in-the-middle attack
What is the function of a honeypot in cybersecurity?
A) To secure network access
B) To attract and analyze attackers
C) To encrypt sensitive data
D) To create backups
✔✔ B) To attract and analyze attackers
What type of malware disguises itself as legitimate software?
A) Virus
3
, B) Worm
C) Trojan
D) Ransomware
✔✔ C) Trojan
Which of the following is a common method of credential theft?
A) Brute-force attack
B) Denial of service
C) SQL injection
D) Network sniffing
✔✔ A) Brute-force attack
What does "SQL injection" aim to exploit?
A) Network bandwidth
B) User credentials
C) Database vulnerabilities
D) Firewall configurations
✔✔ C) Database vulnerabilities
4