1. What is a "Backdoor" in cybersecurity?
A. A security flaw that can be exploited by attackers
B. A way for administrators to access systems remotely for maintenance
C. A method to encrypt and decrypt messages
D. A type of Trojan Horse used for remote control of systems
Answer: b) A way for administrators to access systems remotely for maintenance
Rationale: A backdoor is often a legitimate method of remote access for system
administrators but can be exploited by attackers if left unsecured.
2. What does the term "Zero-Day" refer to in cybersecurity?
A. A security flaw that has not been discovered
B. A vulnerability that has been patched by the vendor
C. A vulnerability that is exploited before it is known to the vendor
D. A type of malware that spreads automatically
Answer: c) A vulnerability that is exploited before it is known to the vendor
Rationale: A zero-day exploit occurs when a vulnerability is exploited before the vendor
or developer is aware of it.
3. What is Cybersecurity?
A. Protecting computer systems from physical damage
,B. Ensuring the security of information and systems on the internet
C. Building computer networks for businesses
D. Encrypting email communication
Answer: b) Ensuring the security of information and systems on the internet
Rationale: Cybersecurity focuses on protecting computer systems, networks, and
information from cyber threats and attacks.
4. What is the role of an "Antivirus" software?
A. To monitor network traffic for suspicious activity
B. To detect and remove malicious software (malware) from systems
C. To create a backup of important files
D. To manage user permissions and access control
Answer: b) To detect and remove malicious software (malware) from systems
Rationale: Antivirus software is designed to detect, quarantine, and remove malware
from computer systems.
5. What is the primary purpose of "Access Control" in cybersecurity?
A. To encrypt files for secure storage
B. To prevent unauthorized users from accessing resources
C. To monitor network traffic for intrusions
D. To generate user passwords automatically
Answer: b) To prevent unauthorized users from accessing resources
, Rationale: Access control mechanisms are used to restrict and control access to
sensitive information and resources based on user permissions.
6. What is "Social Engineering" in cybersecurity?
A. Using advanced algorithms to protect data
B. Attacking systems via brute force
C. Manipulating people into divulging confidential information
D. Preventing unauthorized network access through technology
Answer: c) Manipulating people into divulging confidential information
Rationale: Social engineering involves manipulating individuals into revealing
confidential information or performing actions that compromise security.
7. Which of the following is a type of malware that spreads by replicating itself?
A. Trojan Horse
B. Virus
C. Spyware
D. Ransomware
Answer: b) Virus
Rationale: A virus is a type of malware that attaches itself to legitimate programs and
spreads when the program is executed.
8. What is a "VPN" (Virtual Private Network) used for?
A. A security flaw that can be exploited by attackers
B. A way for administrators to access systems remotely for maintenance
C. A method to encrypt and decrypt messages
D. A type of Trojan Horse used for remote control of systems
Answer: b) A way for administrators to access systems remotely for maintenance
Rationale: A backdoor is often a legitimate method of remote access for system
administrators but can be exploited by attackers if left unsecured.
2. What does the term "Zero-Day" refer to in cybersecurity?
A. A security flaw that has not been discovered
B. A vulnerability that has been patched by the vendor
C. A vulnerability that is exploited before it is known to the vendor
D. A type of malware that spreads automatically
Answer: c) A vulnerability that is exploited before it is known to the vendor
Rationale: A zero-day exploit occurs when a vulnerability is exploited before the vendor
or developer is aware of it.
3. What is Cybersecurity?
A. Protecting computer systems from physical damage
,B. Ensuring the security of information and systems on the internet
C. Building computer networks for businesses
D. Encrypting email communication
Answer: b) Ensuring the security of information and systems on the internet
Rationale: Cybersecurity focuses on protecting computer systems, networks, and
information from cyber threats and attacks.
4. What is the role of an "Antivirus" software?
A. To monitor network traffic for suspicious activity
B. To detect and remove malicious software (malware) from systems
C. To create a backup of important files
D. To manage user permissions and access control
Answer: b) To detect and remove malicious software (malware) from systems
Rationale: Antivirus software is designed to detect, quarantine, and remove malware
from computer systems.
5. What is the primary purpose of "Access Control" in cybersecurity?
A. To encrypt files for secure storage
B. To prevent unauthorized users from accessing resources
C. To monitor network traffic for intrusions
D. To generate user passwords automatically
Answer: b) To prevent unauthorized users from accessing resources
, Rationale: Access control mechanisms are used to restrict and control access to
sensitive information and resources based on user permissions.
6. What is "Social Engineering" in cybersecurity?
A. Using advanced algorithms to protect data
B. Attacking systems via brute force
C. Manipulating people into divulging confidential information
D. Preventing unauthorized network access through technology
Answer: c) Manipulating people into divulging confidential information
Rationale: Social engineering involves manipulating individuals into revealing
confidential information or performing actions that compromise security.
7. Which of the following is a type of malware that spreads by replicating itself?
A. Trojan Horse
B. Virus
C. Spyware
D. Ransomware
Answer: b) Virus
Rationale: A virus is a type of malware that attaches itself to legitimate programs and
spreads when the program is executed.
8. What is a "VPN" (Virtual Private Network) used for?