1. Which security mechanism ensures that data has not been tampered with during
transmission?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
Answer: b) Integrity
Rationale: Integrity ensures that data remains accurate and unaltered during
transmission or storage.
2. What is the role of a "Security Information and Event Management" (SIEM) system?
A. To provide real-time analysis and reporting of security incidents
B. To prevent unauthorized network access
C. To encrypt sensitive data
D. To manage the distribution of antivirus software
Answer: a) To provide real-time analysis and reporting of security incidents
Rationale: SIEM systems aggregate and analyze security data to provide real-time
alerts and reports about security incidents.
3. What is a "Backdoor" in cybersecurity?
,A. A security flaw that can be exploited by attackers
B. A way for administrators to access systems remotely for maintenance
C. A method to encrypt and decrypt messages
D. A type of Trojan Horse used for remote control of systems
Answer: b) A way for administrators to access systems remotely for maintenance
Rationale: A backdoor is often a legitimate method of remote access for system
administrators but can be exploited by attackers if left unsecured.
4. What is "Keylogging"?
A. A method of capturing network traffic for analysis
B. A technique used by attackers to record keystrokes on a victim's device
C. A method of encrypting sensitive information
D. A process for securely backing up data
Answer: b) A technique used by attackers to record keystrokes on a victim's device
Rationale: Keylogging involves tracking and recording the keys a user presses on their
keyboard, often used for stealing passwords or sensitive information.
5. What is a "Botnet"?
A. A network of infected computers controlled remotely by attackers
B. A system that protects networks from malicious attacks
C. A type of firewall that blocks all incoming traffic
D. A method of encrypting internet communications
, Answer: a) A network of infected computers controlled remotely by attackers
Rationale: A botnet is a group of compromised computers that can be controlled
remotely to carry out malicious activities.
6. What is the purpose of "Data Backup" in cybersecurity?
A. To prevent unauthorized access to files
B. To create copies of data for recovery in case of a disaster or attack
C. To encrypt data for secure storage
D. To monitor data for unusual activity
Answer: b) To create copies of data for recovery in case of a disaster or attack
Rationale: Data backup ensures that critical information can be restored in the event of
data loss, ransomware attacks, or system failures.
7. What is "Patch Tuesday"?
A. A day when software companies release security patches and updates
B. A technique to detect unauthorized access
C. A cybersecurity tool used to monitor activities
D. A scheduled time for system backups
Answer: a) A day when software companies release security patches and updates
Rationale: Patch Tuesday is a regular release day for Microsoft updates and security
patches, typically occurring on the second Tuesday of each month.
transmission?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
Answer: b) Integrity
Rationale: Integrity ensures that data remains accurate and unaltered during
transmission or storage.
2. What is the role of a "Security Information and Event Management" (SIEM) system?
A. To provide real-time analysis and reporting of security incidents
B. To prevent unauthorized network access
C. To encrypt sensitive data
D. To manage the distribution of antivirus software
Answer: a) To provide real-time analysis and reporting of security incidents
Rationale: SIEM systems aggregate and analyze security data to provide real-time
alerts and reports about security incidents.
3. What is a "Backdoor" in cybersecurity?
,A. A security flaw that can be exploited by attackers
B. A way for administrators to access systems remotely for maintenance
C. A method to encrypt and decrypt messages
D. A type of Trojan Horse used for remote control of systems
Answer: b) A way for administrators to access systems remotely for maintenance
Rationale: A backdoor is often a legitimate method of remote access for system
administrators but can be exploited by attackers if left unsecured.
4. What is "Keylogging"?
A. A method of capturing network traffic for analysis
B. A technique used by attackers to record keystrokes on a victim's device
C. A method of encrypting sensitive information
D. A process for securely backing up data
Answer: b) A technique used by attackers to record keystrokes on a victim's device
Rationale: Keylogging involves tracking and recording the keys a user presses on their
keyboard, often used for stealing passwords or sensitive information.
5. What is a "Botnet"?
A. A network of infected computers controlled remotely by attackers
B. A system that protects networks from malicious attacks
C. A type of firewall that blocks all incoming traffic
D. A method of encrypting internet communications
, Answer: a) A network of infected computers controlled remotely by attackers
Rationale: A botnet is a group of compromised computers that can be controlled
remotely to carry out malicious activities.
6. What is the purpose of "Data Backup" in cybersecurity?
A. To prevent unauthorized access to files
B. To create copies of data for recovery in case of a disaster or attack
C. To encrypt data for secure storage
D. To monitor data for unusual activity
Answer: b) To create copies of data for recovery in case of a disaster or attack
Rationale: Data backup ensures that critical information can be restored in the event of
data loss, ransomware attacks, or system failures.
7. What is "Patch Tuesday"?
A. A day when software companies release security patches and updates
B. A technique to detect unauthorized access
C. A cybersecurity tool used to monitor activities
D. A scheduled time for system backups
Answer: a) A day when software companies release security patches and updates
Rationale: Patch Tuesday is a regular release day for Microsoft updates and security
patches, typically occurring on the second Tuesday of each month.