Q31. What is the primary purpose of encryption?
a) To manage network traffic
b) To protect data by converting it into a secure format
c) To monitor system performance
d) To create strong passwords
Show Answer
Correct Answer: b) To protect data by converting it into a secure format
Explanation: Encryption converts data into a secure format that can only be decrypted by authorized parties. This protects data from unauthorized access and ensures its confidentiality.
Q32. What is a “virus” in cybersecurity?
a) A type of hardware device
b) A malicious program that attaches itself to files and spreads
c) A tool for network management
d) A method for data encryption
Show Answer
Correct Answer: b) A malicious program that attaches itself to files and spreads
Explanation: A virus is a type of malware that attaches itself to legitimate files and spreads to other files and systems. It can cause damage and disrupt normal operations.
Q33. What is “two-factor authentication”?
a) A method to encrypt data
b) A security process that requires two forms of verification
c) A type of malware
d) A network management tool
Show Answer
Correct Answer: b) A security process that requires two forms of verification
Explanation: Two-factor authentication enhances security by requiring users to provide two different forms of verification before accessing an account or system. This adds an extra layer of protection against unauthorized access.
Q34. How does a firewall help in securing a network?
a) By encrypting network traffic
b) By blocking unauthorized access and monitoring traffic
c) By scanning for viruses
d) By managing user permissions
Show Answer
Correct Answer: b) By blocking unauthorized access and monitoring traffic
Explanation: A firewall helps secure a network by blocking unauthorized access based on security rules and monitoring incoming and outgoing traffic to detect and prevent potential threats.
Q35. What does “data protection” involve?
a) Storing data in a secure location
b) Creating strong passwords
c) Ensuring that data is kept confidential and secure
d) Regularly updating software
Show Answer
Correct Answer: c) Ensuring that data is kept confidential and secure
Explanation: Data protection involves measures to keep data confidential and secure from unauthorized access, loss, or corruption. It encompasses various strategies and practices to safeguard information.
Q36. What is a “spyware”?
a) Software designed to protect against malware
b) Software that secretly collects user data without consent
c) A type of firewall
d) A method of encryption
Show Answer
Correct Answer: b) Software that secretly collects user data without consent
Explanation: Spyware is a type of malware that secretly collects and transmits user data without their consent. It often tracks user activity and can invade privacy.
Q37. What is “risk management” in cybersecurity?
a) Encrypting data for transmission
b) Implementing controls to mitigate identified risks
c) Monitoring network traffic
d) Installing antivirus software
Show Answer
Correct Answer: b) Implementing controls to mitigate identified risks
Explanation: Risk management involves identifying, assessing, and implementing controls to mitigate or manage risks. It aims to reduce the likelihood and impact of potential security threats.
Q38. What is a “security mechanism”?
a) A tool for managing passwords
b) A technique or tool used to enforce security policies
c) A type of malware
d) A method for data recovery
Show Answer
Correct Answer: b) A technique or tool used to enforce security policies
Explanation: Security mechanisms are techniques or tools used to implement and enforce security policies. They help in protecting information and systems by providing various security functions.
Q39. What is a “security policy”?
a) A document outlining organizational security rules and guidelines
b) A type of malware
c) A method for network management
d) A software for encrypting data
Show Answer
Correct Answer: a) A document outlining organizational security rules and guidelines
Explanation: A security policy is a formal document that outlines the rules, procedures, and guidelines for managing and protecting an organization’s information and resources from security threats.
Q40. What does the term “netiquette” refer to?
a) The use of network security tools
b) Guidelines for polite and effective online communication
c) Techniques for encrypting data
d) Methods for monitoring network traffic
Show Answer
Correct Answer: b) Guidelines for polite and effective online communication
Explanation: Netiquette refers to the set of guidelines for courteous and effective communication on the internet. It helps ensure respectful and appropriate interactions in online environments.