Q61. What is a “malware”?
a) Software designed to protect systems
b) Software intended to damage or disrupt systems
c) A tool for managing network traffic
d) A method for encrypting data
Show Answer
Correct Answer: b) Software intended to damage or disrupt systems
Explanation: Malware is software designed to damage, disrupt, or gain unauthorized access to systems. It includes various types such as viruses, worms, and Trojans.
Q62. What does “data integrity” ensure?
a) Data is encrypted during storage
b) Data remains accurate and unaltered
c) Data is available when needed
d) Data is protected from unauthorized access
Show Answer
Correct Answer: b) Data remains accurate and unaltered
Explanation: Data integrity ensures that information remains accurate and unaltered throughout its lifecycle, preventing unauthorized modifications and maintaining data reliability.
Q63. What is “social engineering” in cybersecurity?
a) A method for encrypting data
b) Manipulating people into divulging confidential information
c) A type of malware
d) A tool for network management
Show Answer
Correct Answer: b) Manipulating people into divulging confidential information
Explanation: Social engineering involves manipulating people into revealing confidential information or performing actions that compromise security. It exploits human psychology rather than technical vulnerabilities.
Q64. What is the main purpose of “data backup”?
a) To enhance system performance
b) To ensure that data can be recovered in case of loss or damage
c) To create strong passwords
d) To manage network traffic
Show Answer
Correct Answer: b) To ensure that data can be recovered in case of loss or damage
Explanation: Data backup involves creating copies of data to ensure that it can be recovered in the event of data loss, corruption, or damage. It is a critical aspect of data protection and disaster recovery.
Q65. What does “multi-factor authentication” involve?
a) Using multiple passwords for different accounts
b) Requiring multiple types of verification for access
c) Encrypting data with multiple algorithms
d) Scanning for multiple types of malware
Show Answer
Correct Answer: b) Requiring multiple types of verification for access
Explanation: Multi-factor authentication requires users to provide multiple forms of verification, such as a password and a biometric scan, to access an account or system. This enhances security by adding additional layers of protection.
Q66. What is a “DDoS attack”?
a) An attack that encrypts data
b) An attack that overwhelms a system with traffic to make it unavailable
c) A type of firewall
d) A method for data backup
Show Answer
Correct Answer: b) An attack that overwhelms a system with traffic to make it unavailable
Explanation: A Distributed Denial of Service (DDoS) attack involves overwhelming a system or network with a flood of traffic, rendering it unavailable to legitimate users and disrupting normal operations.
Q67. What does “security awareness training” aim to achieve?
a) To enhance system performance
b) To educate employees about security risks and practices
c) To manage software updates
d) To create strong passwords
Show Answer
Correct Answer: b) To educate employees about security risks and practices
Explanation: Security awareness training educates employees about potential security risks, best practices for protecting information, and how to recognize and respond to security threats. It helps reduce the likelihood of human errors that could lead to security incidents.
Q68. What is the role of a “security audit”?
a) To enhance system performance
b) To evaluate the effectiveness of security measures and controls
c) To create backups of data
d) To manage network traffic
Show Answer
Correct Answer: b) To evaluate the effectiveness of security measures and controls
Explanation: A security audit assesses and evaluates the effectiveness of security measures and controls in place. It helps identify vulnerabilities, ensure compliance with security policies, and improve overall security posture.
Q69. What is “endpoint security”?
a) Security measures for network infrastructure
b) Security measures implemented on individual devices
c) A type of firewall
d) A method for data encryption
Show Answer
Correct Answer: b) Security measures implemented on individual devices
Explanation: Endpoint security refers to the security measures applied to individual devices, such as computers, smartphones, and tablets. It helps protect these devices from threats and vulnerabilities.
Q70. What is “vulnerability management”?
a) A method for encrypting data
b) The process of identifying, assessing, and mitigating security weaknesses
c) A tool for network management
d) A technique for data recovery
Show Answer
Correct Answer: b) The process of identifying, assessing, and mitigating security weaknesses
Explanation: Vulnerability management involves identifying, assessing, and addressing security weaknesses in systems and applications. It helps reduce the risk of exploitation by implementing necessary patches and controls.