Q41. What does “confidentiality” in data security ensure?
a) Data is accurate and complete
b) Data is available to all users
c) Data is protected from unauthorized access
d) Data is encrypted during storage
Show Answer
Correct Answer: c) Data is protected from unauthorized access
Explanation: Confidentiality ensures that data is protected from unauthorized access and exposure. It helps maintain privacy and restricts access to sensitive information to authorized individuals only.
Q42. What is a “worm” in the context of malware?
a) A type of firewall
b) A malicious program that spreads independently
c) A tool for data encryption
d) A network management tool
Show Answer
Correct Answer: b) A malicious program that spreads independently
Explanation: A worm is a type of malware that can replicate itself and spread across networks independently, without needing to attach itself to files or rely on user interaction.
Q43. What is “phishing”?
a) A method for encrypting data
b) A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
c) A type of network attack
d) A tool for managing network traffic
Show Answer
Correct Answer: b) A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
Explanation: Phishing involves fraudulent attempts to obtain sensitive information by pretending to be a trusted source. It often uses deceptive emails or messages to trick individuals.
Q44. What should you do if you encounter a suspicious email with a link?
a) Click on the link to see where it leads
b) Forward the email to your contacts
c) Ignore and delete the email
d) Reply to the email asking for more information
Show Answer
Correct Answer: c) Ignore and delete the email
Explanation: Suspicious emails with unknown links may be phishing attempts. Ignoring and deleting such emails helps prevent potential security risks and avoids falling victim to scams.
Q45. How can you protect your personal information online?
a) By using simple and easy-to-remember passwords
b) By sharing passwords with trusted individuals
c) By using complex passwords and enabling two-factor authentication
d) By avoiding software updates
Show Answer
Correct Answer: c) By using complex passwords and enabling two-factor authentication
Explanation: Using complex passwords and enabling two-factor authentication significantly enhances the security of personal information online. These practices make it harder for attackers to gain unauthorized access.
Q46. What is the main purpose of a firewall?
a) To manage software updates
b) To filter and monitor network traffic
c) To create backups of data
d) To enhance system performance
Show Answer
Correct Answer: b) To filter and monitor network traffic
Explanation: The primary purpose of a firewall is to filter and monitor network traffic based on security rules, preventing unauthorized access and protecting the network from potential threats.
Q47. What does “data availability” ensure?
a) Data is encrypted during transmission
b) Data is accessible when needed
c) Data is protected from unauthorized access
d) Data is backed up regularly
Show Answer
Correct Answer: b) Data is accessible when needed
Explanation: Data availability ensures that information and resources are accessible to authorized users when required. It involves maintaining system uptime and ensuring that data can be retrieved without issues.
Q48. What is a “Trojan horse” in cybersecurity?
a) A legitimate security tool
b) A malicious program disguised as a harmless application
c) A type of network attack
d) A method for encrypting data
Show Answer
Correct Answer: b) A malicious program disguised as a harmless application
Explanation: A Trojan horse is a type of malware that disguises itself as a harmless application or file to trick users into installing it. Once installed, it can perform malicious actions.
Q49. What is “netiquette” in the context of online communication?
a) Guidelines for secure data encryption
b) Rules for polite and respectful communication online
c) Techniques for managing network traffic
d) Methods for identifying malware
Show Answer
Correct Answer: b) Rules for polite and respectful communication online
Explanation: Netiquette refers to the set of rules and guidelines for polite and respectful communication in online interactions. It helps maintain professionalism and courtesy in digital conversations.
Q50. What is a common sign of a phishing attempt?
a) The email is from a familiar contact
b) The email requests sensitive information
c) The email contains an attachment
d) The email is well-formatted and professional
Show Answer
Correct Answer: b) The email requests sensitive information
Explanation: Phishing attempts often involve emails requesting sensitive information or credentials. Being cautious with such requests and verifying their authenticity can help avoid falling victim to phishing scams.