1. What is Cybersecurity?
A. Protecting computer systems from physical damage
B. Ensuring the security of information and systems on the internet
C. Building computer networks for businesses
D. Encrypting email communication
Answer: b) Ensuring the security of information and systems on the internet
Rationale: Cybersecurity focuses on protecting computer systems, networks, and
information from cyber threats and attacks.
2. Which of the following is NOT a primary goal of cybersecurity?
A. Confidentiality
B. Integrity
C. Profitability
D. Availability
Answer: c) Profitability
Rationale: The main goals of cybersecurity are confidentiality, integrity, and availability
(often referred to as the CIA triad), not profitability.
3. What does "Phishing" refer to in the context of cybersecurity?
A. A type of malware
B. A technique to steal sensitive data by pretending to be a trustworthy entity
C. A method to encrypt data
D. A type of firewall
Answer: b) A technique to steal sensitive data by pretending to be a trustworthy entity
Rationale: Phishing involves using fraudulent communications (usually emails) to trick
users into providing sensitive information.
4. What is a "firewall" used for in cybersecurity?
A. To monitor web traffic
B. To block unauthorized access to or from a private network
C. To encrypt data
D. To store backup copies of data
Answer: b) To block unauthorized access to or from a private network
Rationale: A firewall controls the incoming and outgoing network traffic based on
predetermined security rules.
5. Which of the following is a type of malware that spreads by replicating itself?
A. Trojan Horse
B. Virus
C. Spyware
D. Ransomware
Answer: b) Virus
Rationale: A virus is a type of malware that attaches itself to legitimate programs and
spreads when the program is executed.
6. What does "encryption" do in the context of cybersecurity?
A. Protects the data by making it unreadable to unauthorized users
B. Increases the speed of data transmission
, C. Stores data in a cloud-based server
D. Backs up data to prevent loss
Answer: a) Protects the data by making it unreadable to unauthorized users
Rationale: Encryption transforms readable data into a format that cannot be easily
understood by unauthorized users without a decryption key.
7. What is the term for the process of verifying the identity of a user or device?
A. Authorization
B. Authentication
C. Auditing
D. Encryption
Answer: b) Authentication
Rationale: Authentication is the process of verifying the identity of a user, device, or
system.
8. What is "Social Engineering" in cybersecurity?
A. Using advanced algorithms to protect data
B. Attacking systems via brute force
C. Manipulating people into divulging confidential information
D. Preventing unauthorized network access through technology
Answer: c) Manipulating people into divulging confidential information
Rationale: Social engineering involves manipulating individuals into revealing
confidential information or performing actions that compromise security.
9. Which of the following is an example of "two-factor authentication" (2FA)?
A. Using a password and a secret question
B. Using a password and a fingerprint scan
C. Using a password and an encryption key
D. Using a password and a username
Answer: b) Using a password and a fingerprint scan
Rationale: Two-factor authentication (2FA) requires two forms of identification, such as
something you know (password) and something you have (fingerprint).
10. What is the role of an "Antivirus" software?
A. To monitor network traffic for suspicious activity
B. To detect and remove malicious software (malware) from systems
C. To create a backup of important files
D. To manage user permissions and access control
Answer: b) To detect and remove malicious software (malware) from systems
Rationale: Antivirus software is designed to detect, quarantine, and remove malware
from computer systems.
11. Which of the following is an example of a Denial of Service (DoS) attack?
A. Sending an excessive amount of traffic to overwhelm a server
B. Encrypting data and demanding payment for decryption
C. Gaining unauthorized access to a system
D. Stealing user credentials via phishing
Answer: a) Sending an excessive amount of traffic to overwhelm a server
Rationale: A DoS attack floods a system or network with excessive traffic, rendering it
unavailable to legitimate users.
A. Protecting computer systems from physical damage
B. Ensuring the security of information and systems on the internet
C. Building computer networks for businesses
D. Encrypting email communication
Answer: b) Ensuring the security of information and systems on the internet
Rationale: Cybersecurity focuses on protecting computer systems, networks, and
information from cyber threats and attacks.
2. Which of the following is NOT a primary goal of cybersecurity?
A. Confidentiality
B. Integrity
C. Profitability
D. Availability
Answer: c) Profitability
Rationale: The main goals of cybersecurity are confidentiality, integrity, and availability
(often referred to as the CIA triad), not profitability.
3. What does "Phishing" refer to in the context of cybersecurity?
A. A type of malware
B. A technique to steal sensitive data by pretending to be a trustworthy entity
C. A method to encrypt data
D. A type of firewall
Answer: b) A technique to steal sensitive data by pretending to be a trustworthy entity
Rationale: Phishing involves using fraudulent communications (usually emails) to trick
users into providing sensitive information.
4. What is a "firewall" used for in cybersecurity?
A. To monitor web traffic
B. To block unauthorized access to or from a private network
C. To encrypt data
D. To store backup copies of data
Answer: b) To block unauthorized access to or from a private network
Rationale: A firewall controls the incoming and outgoing network traffic based on
predetermined security rules.
5. Which of the following is a type of malware that spreads by replicating itself?
A. Trojan Horse
B. Virus
C. Spyware
D. Ransomware
Answer: b) Virus
Rationale: A virus is a type of malware that attaches itself to legitimate programs and
spreads when the program is executed.
6. What does "encryption" do in the context of cybersecurity?
A. Protects the data by making it unreadable to unauthorized users
B. Increases the speed of data transmission
, C. Stores data in a cloud-based server
D. Backs up data to prevent loss
Answer: a) Protects the data by making it unreadable to unauthorized users
Rationale: Encryption transforms readable data into a format that cannot be easily
understood by unauthorized users without a decryption key.
7. What is the term for the process of verifying the identity of a user or device?
A. Authorization
B. Authentication
C. Auditing
D. Encryption
Answer: b) Authentication
Rationale: Authentication is the process of verifying the identity of a user, device, or
system.
8. What is "Social Engineering" in cybersecurity?
A. Using advanced algorithms to protect data
B. Attacking systems via brute force
C. Manipulating people into divulging confidential information
D. Preventing unauthorized network access through technology
Answer: c) Manipulating people into divulging confidential information
Rationale: Social engineering involves manipulating individuals into revealing
confidential information or performing actions that compromise security.
9. Which of the following is an example of "two-factor authentication" (2FA)?
A. Using a password and a secret question
B. Using a password and a fingerprint scan
C. Using a password and an encryption key
D. Using a password and a username
Answer: b) Using a password and a fingerprint scan
Rationale: Two-factor authentication (2FA) requires two forms of identification, such as
something you know (password) and something you have (fingerprint).
10. What is the role of an "Antivirus" software?
A. To monitor network traffic for suspicious activity
B. To detect and remove malicious software (malware) from systems
C. To create a backup of important files
D. To manage user permissions and access control
Answer: b) To detect and remove malicious software (malware) from systems
Rationale: Antivirus software is designed to detect, quarantine, and remove malware
from computer systems.
11. Which of the following is an example of a Denial of Service (DoS) attack?
A. Sending an excessive amount of traffic to overwhelm a server
B. Encrypting data and demanding payment for decryption
C. Gaining unauthorized access to a system
D. Stealing user credentials via phishing
Answer: a) Sending an excessive amount of traffic to overwhelm a server
Rationale: A DoS attack floods a system or network with excessive traffic, rendering it
unavailable to legitimate users.