Cybersecurity MCQ
Total Questions: 100
a) Confidentiality, Integrity, Availability
b) Confidentiality, Information, Access
c) Control, Integrity, Accountability
d) Compliance, Integrity, Availability
a) Virus
b) Firewall
c) Router
d) Antivirus
a) To filter incoming and outgoing traffic
b) To store data
c) To create websites
d) To manage user accounts
a) Tricking users into revealing personal information
b) A method of network security
c) An antivirus program
d) A type of firewall
a) 123456
b) password
c) a1B2c3D4!
d) qwerty
a) A security process requiring two different forms of identification
b) Using two passwords at once
c) A method of encrypting data
d) A type of firewall
a) Phishing
b) Pretexting
c) Spear phishing
d) Firewall
a) Distributed Denial of Service
b) Direct Data Overwrite
c) Data Denial of Service
d) Data Distribution over Services
a) To secure data by converting it into a coded format
b) To store data safely
c) To enhance network speed
d) To prevent phishing attacks
a) Man-in-the-middle attack
b) Personalized advertising
c) Online shopping
d) Social media marketing
a) Virtual Private Network
b) Visual Public Network
c) Virtual Public Network
d) Visual Private Network
a) Malicious software
b) Malicious hardware
c) Malicious network
d) Malicious service
a) To monitor network traffic for suspicious activity
b) To filter incoming traffic
c) To create backups
d) To manage user accounts
a) Using the same password for all accounts
b) Changing passwords regularly
c) Writing down passwords on paper
d) Sharing passwords with friends
a) Verifies the identity of a user or device
b) Stores passwords
c) Encrypts data
d) Creates a secure connection
a) Unpatched software
b) Strong passwords
c) Regular backups
d) Two-factor authentication
a) Manipulating individuals to gain confidential information
b) A type of encryption
c) A network security protocol
d) A type of malware
a) A type of malware that encrypts files for ransom
b) A method of data backup
c) A network security tool
d) A type of firewall
a) Using WEP encryption
b) Not using a password
c) Disabling encryption
d) Using WPA2 encryption
a) To fix vulnerabilities in software
b) To improve performance
c) To enhance graphics
d) To increase storage capacity
a) Identifying and analyzing potential risks
b) Eliminating all risks
c) Creating passwords
d) Installing firewalls
a) Ignoring software updates
b) Using complex passwords
c) Opening unknown email attachments
d) Sharing passwords
a) To detect and remove malware
b) To create backups
c) To manage passwords
d) To monitor network traffic
a) Spear phishing
b) Online shopping
c) Cloud storage
d) Social media marketing
a) An incident that compromises the confidentiality, integrity, or availability of data
b) A method of encrypting data
c) A type of software
d) A network security tool
a) A network of compromised computers controlled by an attacker
b) A type of firewall
c) An antivirus program
d) A secure network
a) To simulate attacks on a system to identify vulnerabilities
b) To create backups
c) To improve performance
d) To enhance graphics
a) A security flaw that is exploited before it is known to the vendor
b) A type of encryption
c) A method of network security
d) A type of malware
a) Firewall
b) Router
c) Printer
d) Scanner
a) To protect data and systems from unauthorized access and damage
b) To improve software performance
c) To create websites
d) To enhance graphics
a) Using strong passwords
b) Ignoring software updates
c) Sharing personal information online
d) Opening unknown email attachments
a) To create copies of data for recovery
b) To improve performance
c) To enhance graphics
d) To manage passwords
a) Protecting personal information shared on social media
b) Creating social media accounts
c) Using social media for marketing
d) Sharing passwords on social media
a) To encrypt data
b) To decrypt data
c) To verify the identity of a user
d) To create backups
a) A set of guidelines for protecting information and systems
b) A method of network security
c) A type of software
d) A tool for managing user accounts
a) Encryption
b) Data compression
c) Data archiving
d) Data formatting
a) Any potential danger to computer systems and data
b) A type of software
c) A network security tool
d) A method of creating backups
a) To outline steps to take in the event of a data breach
b) To create backups
c) To improve performance
d) To enhance graphics
a) AES
b) WEP
c) FTP
d) SMTP
a) A threat posed by individuals within an organization
b) A type of malware
c) A network security tool
d) A method of encryption
a) To secure data transmitted between a web server and a browser
b) To enhance graphics
c) To improve performance
d) To manage user accounts
a) Loss of sensitive information
b) Improved security
c) Increased performance
d) Decreased vulnerability
a) Firewalls
b) Antivirus software
c) Data encryption
d) All of the above
a) Wireshark
b) Photoshop
c) Word
d) Excel
a) Regularly updating software to fix vulnerabilities
b) Creating backups
c) Improving performance
d) Monitoring network traffic
a) To investigate cyber crimes and gather evidence
b) To create websites
c) To manage databases
d) To enhance graphics
a) Social engineering
b) Data breach
c) Ransomware
d) DDoS
a) Dividing a network into smaller parts to improve security
b) Creating backups
c) Improving performance
d) Enhancing graphics
a) To evaluate an organization's security measures
b) To create backups
c) To improve performance
d) To manage user accounts
a) Data breaches
b) Improved performance
c) Increased storage capacity
d) Enhanced graphics