CyberSecurity Introduction :
1. What is the primary goal of cybersecurity?
- a) To protect physical assets
- b) To detect intrusions in physical locations
- c) To protect systems, networks, and data from digital attacks
- d) To prevent system shutdowns
- Correct answer: c) To protect systems, networks, and data from digital attacks
2. Which of the following is considered a cyber threat?
- a) A power outage
- b) A phishing email
- c) A network upgrade
- d) A software installation
- Correct answer: b) A phishing email
3. What does the term "malware" stand for?
- a) Malicious software
- b) Management software
- c) Multi-access software
- d) Machine language software
- Correct answer: a) Malicious software
4. Which of the following is a method used by hackers to gain unauthorized access to a
system?
- a) Encryption
- b) Phishing
- c) Virtualization
- d) Backup
- Correct answer: b) Phishing
5. What is the process of converting data into an unreadable format to protect it from
unauthorized access?
- a) Authentication
- b) Encryption
- c) Decryption
- d) Hacking
- Correct answer: b) Encryption
6. Which cybersecurity principle focuses on ensuring that authorized users have access to
information when needed?
- a) Integrity
- b) Availability
- c) Confidentiality
- d) Non-repudiation
- Correct answer: b) Availability
7. Which of the following is NOT a common form of cybersecurity threat?
- a) Worms
- b) Firewalls
- c) Ransomware
- d) Spyware
- Correct answer: b) Firewalls
8. What is a firewall used for in cybersecurity?
- a) To scan systems for vulnerabilities
- b) To block unauthorized access to a network
- c) To encrypt sensitive data
- d) To monitor employee activity
- Correct answer: b) To block unauthorized access to a network
9. Which term refers to the practice of attempting to gain unauthorized access to systems or
networks to find vulnerabilities?
- a) Ethical hacking
- b) Phishing
- c) Data mining
- d) Spamming
- Correct answer: a) Ethical hacking
10. What is the main purpose of multi-factor authentication (MFA)?
- a) To provide an extra layer of security by requiring multiple forms of verification
- b) To replace usernames and passwords
- c) To encrypt sensitive data
- d) To store user credentials securely
- Correct answer: a) To provide an extra layer of security by requiring multiple forms of
verification