0% found this document useful (0 votes)
46 views2 pages

Cybersecurity Basics and Key Concepts

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views2 pages

Cybersecurity Basics and Key Concepts

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CyberSecurity Introduction :

1. What is the primary goal of cybersecurity?


- a) To protect physical assets
- b) To detect intrusions in physical locations
- c) To protect systems, networks, and data from digital attacks
- d) To prevent system shutdowns
- Correct answer: c) To protect systems, networks, and data from digital attacks

2. Which of the following is considered a cyber threat?


- a) A power outage
- b) A phishing email
- c) A network upgrade
- d) A software installation
- Correct answer: b) A phishing email

3. What does the term "malware" stand for?


- a) Malicious software
- b) Management software
- c) Multi-access software
- d) Machine language software
- Correct answer: a) Malicious software

4. Which of the following is a method used by hackers to gain unauthorized access to a


system?
- a) Encryption
- b) Phishing
- c) Virtualization
- d) Backup
- Correct answer: b) Phishing

5. What is the process of converting data into an unreadable format to protect it from
unauthorized access?
- a) Authentication
- b) Encryption
- c) Decryption
- d) Hacking
- Correct answer: b) Encryption

6. Which cybersecurity principle focuses on ensuring that authorized users have access to
information when needed?
- a) Integrity
- b) Availability
- c) Confidentiality
- d) Non-repudiation
- Correct answer: b) Availability

7. Which of the following is NOT a common form of cybersecurity threat?


- a) Worms
- b) Firewalls
- c) Ransomware
- d) Spyware
- Correct answer: b) Firewalls

8. What is a firewall used for in cybersecurity?


- a) To scan systems for vulnerabilities
- b) To block unauthorized access to a network
- c) To encrypt sensitive data
- d) To monitor employee activity
- Correct answer: b) To block unauthorized access to a network

9. Which term refers to the practice of attempting to gain unauthorized access to systems or
networks to find vulnerabilities?
- a) Ethical hacking
- b) Phishing
- c) Data mining
- d) Spamming
- Correct answer: a) Ethical hacking

10. What is the main purpose of multi-factor authentication (MFA)?


- a) To provide an extra layer of security by requiring multiple forms of verification
- b) To replace usernames and passwords
- c) To encrypt sensitive data
- d) To store user credentials securely
- Correct answer: a) To provide an extra layer of security by requiring multiple forms of
verification

You might also like