1. Which of the following is the main purpose of "End-to-End Encryption"?
A. To ensure data remains encrypted while being transmitted between two parties
B. To prevent unauthorized users from accessing a website
C. To create backups of data
D. To protect physical hardware from theft
Answer: a) To ensure data remains encrypted while being transmitted between two
parties
Rationale: End-to-end encryption protects data during transmission, ensuring that only
the sender and recipient can read it.
2. Which of the following is an example of "Multi-factor Authentication"?
A. Using a password and answering a security question
B. Using a password and a unique code sent to your phone
C. Using a password and an email verification link
D. Using a password and a fingerprint scan
Answer: b) Using a password and a unique code sent to your phone
Rationale: Multi-factor authentication (MFA) involves using more than one verification
method, such as something you know (password) and something you have (code sent
to a phone).
3. What does the term "Data Breach" refer to?
,A. The unauthorized access, acquisition, or disclosure of sensitive data
B. A network disruption caused by a denial-of-service attack
C. A legitimate access to protected data by an authorized user
D. A software vulnerability that has been patched
Answer: a) The unauthorized access, acquisition, or disclosure of sensitive data
Rationale: A data breach occurs when sensitive data is accessed or stolen by
unauthorized individuals.
4. What does "encryption" do in the context of cybersecurity?
A. Protects the data by making it unreadable to unauthorized users
B. Increases the speed of data transmission
C. Stores data in a cloud-based server
D. Backs up data to prevent loss
Answer: a) Protects the data by making it unreadable to unauthorized users
Rationale: Encryption transforms readable data into a format that cannot be easily
understood by unauthorized users without a decryption key.
5. What is the best practice when creating strong passwords?
A. Use only letters and numbers
B. Use long and complex passwords with a combination of letters, numbers, and
symbols
C. Use a password that is easy to remember
, D. Reuse passwords across multiple accounts for convenience
Answer: b) Use long and complex passwords with a combination of letters, numbers,
and symbols
Rationale: Complex passwords are more difficult for attackers to guess or crack,
enhancing security.
6. What is "Cryptojacking"?
A. A technique for stealing cryptocurrency wallets
B. A method of using infected computers to mine cryptocurrency without user consent
C. A way to store cryptocurrency securely
D. A method of encrypting files for ransom
Answer: b) A method of using infected computers to mine cryptocurrency without user
consent
Rationale: Cryptojacking involves hijacking the processing power of users' devices to
mine cryptocurrency without their consent.
7. Which of the following is a type of malware that spreads by replicating itself?
A. Trojan Horse
B. Virus
C. Spyware
D. Ransomware
Answer: b) Virus
A. To ensure data remains encrypted while being transmitted between two parties
B. To prevent unauthorized users from accessing a website
C. To create backups of data
D. To protect physical hardware from theft
Answer: a) To ensure data remains encrypted while being transmitted between two
parties
Rationale: End-to-end encryption protects data during transmission, ensuring that only
the sender and recipient can read it.
2. Which of the following is an example of "Multi-factor Authentication"?
A. Using a password and answering a security question
B. Using a password and a unique code sent to your phone
C. Using a password and an email verification link
D. Using a password and a fingerprint scan
Answer: b) Using a password and a unique code sent to your phone
Rationale: Multi-factor authentication (MFA) involves using more than one verification
method, such as something you know (password) and something you have (code sent
to a phone).
3. What does the term "Data Breach" refer to?
,A. The unauthorized access, acquisition, or disclosure of sensitive data
B. A network disruption caused by a denial-of-service attack
C. A legitimate access to protected data by an authorized user
D. A software vulnerability that has been patched
Answer: a) The unauthorized access, acquisition, or disclosure of sensitive data
Rationale: A data breach occurs when sensitive data is accessed or stolen by
unauthorized individuals.
4. What does "encryption" do in the context of cybersecurity?
A. Protects the data by making it unreadable to unauthorized users
B. Increases the speed of data transmission
C. Stores data in a cloud-based server
D. Backs up data to prevent loss
Answer: a) Protects the data by making it unreadable to unauthorized users
Rationale: Encryption transforms readable data into a format that cannot be easily
understood by unauthorized users without a decryption key.
5. What is the best practice when creating strong passwords?
A. Use only letters and numbers
B. Use long and complex passwords with a combination of letters, numbers, and
symbols
C. Use a password that is easy to remember
, D. Reuse passwords across multiple accounts for convenience
Answer: b) Use long and complex passwords with a combination of letters, numbers,
and symbols
Rationale: Complex passwords are more difficult for attackers to guess or crack,
enhancing security.
6. What is "Cryptojacking"?
A. A technique for stealing cryptocurrency wallets
B. A method of using infected computers to mine cryptocurrency without user consent
C. A way to store cryptocurrency securely
D. A method of encrypting files for ransom
Answer: b) A method of using infected computers to mine cryptocurrency without user
consent
Rationale: Cryptojacking involves hijacking the processing power of users' devices to
mine cryptocurrency without their consent.
7. Which of the following is a type of malware that spreads by replicating itself?
A. Trojan Horse
B. Virus
C. Spyware
D. Ransomware
Answer: b) Virus