Q21. Which of the following is NOT a common type of malware?
a) Virus
b) Worm
c) Firewall
d) Trojan horse
Show Answer
Correct Answer: c) Firewall
Explanation: A firewall is a security tool used to monitor and control network traffic, not malware. Common types of malware include viruses, worms, and Trojan horses.
Q22. What does the term “data integrity” refer to?
a) Ensuring that data is accessible to authorized users
b) Maintaining the accuracy and consistency of data
c) Protecting data from unauthorized access
d) Encrypting data for secure transmission
Show Answer
Correct Answer: b) Maintaining the accuracy and consistency of data
Explanation: Data integrity ensures that information remains accurate and unaltered during storage, processing, and transmission. It is crucial for maintaining the reliability of data.
Q23. What is the purpose of “netiquette”?
a) To manage network traffic
b) To establish guidelines for online behavior
c) To encrypt online communications
d) To protect against malware
Show Answer
Correct Answer: b) To establish guidelines for online behavior
Explanation: Netiquette refers to the set of rules and guidelines for proper and respectful behavior while interacting online. It helps ensure effective and courteous communication on the internet.
Q24. Which of the following is an effective way to protect personal data online?
a) Sharing passwords with trusted friends
b) Using the same password for multiple accounts
c) Regularly updating passwords and using two-factor authentication
d) Avoiding software updates
Show Answer
Correct Answer: c) Regularly updating passwords and using two-factor authentication
Explanation: Regularly updating passwords and enabling two-factor authentication are effective measures to protect personal data online. These practices enhance security and reduce the risk of unauthorized access.
Q25. What is “risk” in the context of cybersecurity?
a) The likelihood of an attack occurring
b) The potential impact of a security breach
c) The measure of effectiveness of security controls
d) Both a and b
Show Answer
Correct Answer: d) Both a and b
Explanation: In cybersecurity, risk encompasses both the likelihood of an attack occurring and the potential impact of a security breach. Assessing risk involves understanding both these factors to implement appropriate security measures.
Q26. What is the purpose of “security policies”?
a) To regulate employee salaries
b) To establish rules and procedures for maintaining security
c) To manage software licenses
d) To improve system performance
Show Answer
Correct Answer: b) To establish rules and procedures for maintaining security
Explanation: Security policies define the rules and procedures for managing and maintaining security within an organization. They help ensure that security measures are consistently applied and adhered to.
Q27. How can you protect yourself from spyware?
a) By disabling your firewall
b) By avoiding downloading software from untrusted sources
c) By sharing your personal information on social media
d) By using weak passwords
Show Answer
Correct Answer: b) By avoiding downloading software from untrusted sources
Explanation: Spyware often gets installed through untrusted software downloads. To protect against spyware, avoid downloading software from unknown or untrusted sources and use reliable security tools.
Q28. What does the term “availability” in cybersecurity mean?
a) Ensuring that data is encrypted
b) Ensuring that data is accessible when needed
c) Verifying the identity of users
d) Protecting data from unauthorized access
Show Answer
Correct Answer: b) Ensuring that data is accessible when needed
Explanation: Availability ensures that information and resources are accessible to authorized users when needed. It involves maintaining and ensuring the uptime and accessibility of systems and data.
Q29. What is a common method used by attackers to distribute malware?
a) Installing antivirus software
b) Phishing emails with malicious attachments
c) Using strong passwords
d) Encrypting data
Show Answer
Correct Answer: b) Phishing emails with malicious attachments
Explanation: Attackers often use phishing emails with malicious attachments to distribute malware. These emails trick users into opening attachments that contain harmful software.
Q30. What does “confidentiality” in a security context ensure?
a) Data is available to all users
b) Data is accurate and unaltered
c) Data is protected from unauthorized access
d) Data is encrypted during transmission
Show Answer
Correct Answer: c) Data is protected from unauthorized access
Explanation: Confidentiality ensures that data is protected from unauthorized access and disclosure, thereby maintaining privacy and preventing sensitive information from being exposed.