Q1. What does the term “vulnerability” refer to in cybersecurity?
a) A method used to protect data from unauthorized access
b) A weakness in a system that can be exploited
c) A type of malware designed to damage systems
d) A policy for managing access controls
Show Answer
Correct Answer: b) A weakness in a system that can be exploited
Explanation: Vulnerability refers to a weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause harm. Identifying and addressing vulnerabilities is critical for maintaining security.
Q2. What are the three main principles of information security known as the CIA triad?
a) Confidentiality, Integrity, Availability
b) Confidentiality, Integrity, Authentication
c) Confidentiality, Identification, Accessibility
d) Consistency, Integrity, Availability
Show Answer
Correct Answer: a) Confidentiality, Integrity, Availability
Explanation: The CIA triad represents the core principles of information security. Confidentiality ensures that information is only accessible to authorized users, Integrity ensures that information remains accurate and unaltered, and Availability ensures that information and resources are accessible when needed.
Q3. What is a strong password characterized by?
a) Using a common word
b) A mix of letters, numbers, and special characters
c) Using only lowercase letters
d) A sequence of numbers
Show Answer
Correct Answer: b) A mix of letters, numbers, and special characters
Explanation: A strong password typically includes a combination of uppercase and lowercase letters, numbers, and special characters. This complexity helps to prevent unauthorized access and increases security.
Q4. How can you identify a secure website?
a) It uses HTTP protocol
b) It has a lock symbol and HTTPS in the URL
c) It has a .com domain
d) It has a visible privacy policy
Show Answer
Correct Answer: b) It has a lock symbol and HTTPS in the URL
Explanation: A secure website can be identified by the presence of HTTPS in the URL and a lock symbol in the address bar, indicating that the website uses encryption to protect data during transmission.
Q5. Which of the following is an example of malware?
a) Firewall
b) Antivirus
c) Trojan horse
d) Encryption
Show Answer
Correct Answer: c) Trojan horse
Explanation: A Trojan horse is a type of malware that disguises itself as a legitimate software but can perform malicious actions once installed. Firewalls and antivirus software are security tools used to protect against malware, and encryption is a method of securing data.
Q6. What is phishing?
a) A type of malware
b) An attempt to acquire sensitive information by masquerading as a trustworthy entity
c) A method of encrypting data
d) A process of securing network traffic
Show Answer
Correct Answer: b) An attempt to acquire sensitive information by masquerading as a trustworthy entity
Explanation: Phishing is a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity. It often involves deceptive emails or messages to trick individuals into revealing personal details.
Q7. Which of the following best describes a “worm” in cybersecurity?
a) A type of software that damages hardware
b) A self-replicating program that spreads across networks
c) A method to secure email communications
d) A type of password cracker
Show Answer
Correct Answer: b) A self-replicating program that spreads across networks
Explanation: A worm is a type of malware that can replicate itself and spread across networks without needing human intervention. It often exploits vulnerabilities to infect other systems.
Q8. What should you do if you receive an unsolicited email asking for personal information?
a) Reply with the requested information
b) Ignore and delete the email
c) Forward the email to your friends
d) Open any attachments to check for security
Show Answer
Correct Answer: b) Ignore and delete the email
Explanation: Unsolicited emails asking for personal information are often phishing attempts. It is safest to ignore and delete such emails to avoid potential security risks.
Q9. What is the purpose of private browsing mode in a web browser?
a) To increase browsing speed
b) To save all browsing history
c) To prevent the storage of browsing history and cookies
d) To enhance the security of online transactions
Show Answer
Correct Answer: c) To prevent the storage of browsing history and cookies
Explanation: Private browsing mode prevents the web browser from storing browsing history, cookies, and other site data, providing a layer of privacy during the browsing session.
Q10. What does the IT Act 2000 primarily address?
a) Software licensing
b) Data protection and privacy
c) Electronic commerce and cybercrime
d) Network infrastructure
Show Answer
Correct Answer: c) Electronic commerce and cybercrime
Explanation: The IT Act 2000 addresses issues related to electronic commerce, electronic records, digital signatures, and cybercrime, aiming to provide a legal framework for the digital environment in India.