1. What does "encryption" do in the context of cybersecurity?
A. Protects the data by making it unreadable to unauthorized users
B. Increases the speed of data transmission
C. Stores data in a cloud-based server
D. Backs up data to prevent loss
Answer: a) Protects the data by making it unreadable to unauthorized users
Rationale: Encryption transforms readable data into a format that cannot be easily
understood by unauthorized users without a decryption key.
2. What is a "Botnet"?
A. A network of infected computers controlled remotely by attackers
B. A system that protects networks from malicious attacks
C. A type of firewall that blocks all incoming traffic
D. A method of encrypting internet communications
Answer: a) A network of infected computers controlled remotely by attackers
Rationale: A botnet is a group of compromised computers that can be controlled
remotely to carry out malicious activities.
3. What does "Phishing" refer to in the context of cybersecurity?
A. A type of malware
,B. A technique to steal sensitive data by pretending to be a trustworthy entity
C. A method to encrypt data
D. A type of firewall
Answer: b) A technique to steal sensitive data by pretending to be a trustworthy entity
Rationale: Phishing involves using fraudulent communications (usually emails) to trick
users into providing sensitive information.
4. What is "Keylogging"?
A. A method of capturing network traffic for analysis
B. A technique used by attackers to record keystrokes on a victim's device
C. A method of encrypting sensitive information
D. A process for securely backing up data
Answer: b) A technique used by attackers to record keystrokes on a victim's device
Rationale: Keylogging involves tracking and recording the keys a user presses on their
keyboard, often used for stealing passwords or sensitive information.
5. Which of the following is the main purpose of "End-to-End Encryption"?
A. To ensure data remains encrypted while being transmitted between two parties
B. To prevent unauthorized users from accessing a website
C. To create backups of data
D. To protect physical hardware from theft
, Answer: a) To ensure data remains encrypted while being transmitted between two
parties
Rationale: End-to-end encryption protects data during transmission, ensuring that only
the sender and recipient can read it.
6. Which of the following is an example of a Denial of Service (DoS) attack?
A. Sending an excessive amount of traffic to overwhelm a server
B. Encrypting data and demanding payment for decryption
C. Gaining unauthorized access to a system
D. Stealing user credentials via phishing
Answer: a) Sending an excessive amount of traffic to overwhelm a server
Rationale: A DoS attack floods a system or network with excessive traffic, rendering it
unavailable to legitimate users.
7. What is the most common method for attackers to gain unauthorized access to a
system?
A. Exploiting software vulnerabilities
B. Using advanced hardware attacks
C. Gaining physical access to the system
D. Cracking strong passwords
Answer: a) Exploiting software vulnerabilities
Rationale: Many cyberattacks are successful due to vulnerabilities in software that
attackers can exploit.
A. Protects the data by making it unreadable to unauthorized users
B. Increases the speed of data transmission
C. Stores data in a cloud-based server
D. Backs up data to prevent loss
Answer: a) Protects the data by making it unreadable to unauthorized users
Rationale: Encryption transforms readable data into a format that cannot be easily
understood by unauthorized users without a decryption key.
2. What is a "Botnet"?
A. A network of infected computers controlled remotely by attackers
B. A system that protects networks from malicious attacks
C. A type of firewall that blocks all incoming traffic
D. A method of encrypting internet communications
Answer: a) A network of infected computers controlled remotely by attackers
Rationale: A botnet is a group of compromised computers that can be controlled
remotely to carry out malicious activities.
3. What does "Phishing" refer to in the context of cybersecurity?
A. A type of malware
,B. A technique to steal sensitive data by pretending to be a trustworthy entity
C. A method to encrypt data
D. A type of firewall
Answer: b) A technique to steal sensitive data by pretending to be a trustworthy entity
Rationale: Phishing involves using fraudulent communications (usually emails) to trick
users into providing sensitive information.
4. What is "Keylogging"?
A. A method of capturing network traffic for analysis
B. A technique used by attackers to record keystrokes on a victim's device
C. A method of encrypting sensitive information
D. A process for securely backing up data
Answer: b) A technique used by attackers to record keystrokes on a victim's device
Rationale: Keylogging involves tracking and recording the keys a user presses on their
keyboard, often used for stealing passwords or sensitive information.
5. Which of the following is the main purpose of "End-to-End Encryption"?
A. To ensure data remains encrypted while being transmitted between two parties
B. To prevent unauthorized users from accessing a website
C. To create backups of data
D. To protect physical hardware from theft
, Answer: a) To ensure data remains encrypted while being transmitted between two
parties
Rationale: End-to-end encryption protects data during transmission, ensuring that only
the sender and recipient can read it.
6. Which of the following is an example of a Denial of Service (DoS) attack?
A. Sending an excessive amount of traffic to overwhelm a server
B. Encrypting data and demanding payment for decryption
C. Gaining unauthorized access to a system
D. Stealing user credentials via phishing
Answer: a) Sending an excessive amount of traffic to overwhelm a server
Rationale: A DoS attack floods a system or network with excessive traffic, rendering it
unavailable to legitimate users.
7. What is the most common method for attackers to gain unauthorized access to a
system?
A. Exploiting software vulnerabilities
B. Using advanced hardware attacks
C. Gaining physical access to the system
D. Cracking strong passwords
Answer: a) Exploiting software vulnerabilities
Rationale: Many cyberattacks are successful due to vulnerabilities in software that
attackers can exploit.