Q91. What is a ‘digital certificate’?
a) A document that verifies online purchases
b) An electronic document used to authenticate the identity of an organization or individual
c) A tool for managing network traffic
d) A software for creating secure passwords
Show Answer
Correct Answer: b) An electronic document used to authenticate the identity of an organization or individual
Explanation: A digital certificate is an electronic document used to authenticate the identity of an organization or individual, providing a way to establish secure communications and verify the legitimacy of online transactions.
Q92. What is a ‘vulnerability scan’?
a) A process of optimizing network speed
b) An examination of systems to identify security weaknesses
c) A tool for managing user passwords
d) A method of enhancing device performance
Show Answer
Correct Answer: b) An examination of systems to identify security weaknesses
Explanation: A vulnerability scan involves examining systems to identify security weaknesses or vulnerabilities that could be exploited by attackers. Regular scans help in identifying and addressing potential security risks before they can be exploited.
Q93. What is the primary function of a ‘security patch’?
a) To add new features to software
b) To fix vulnerabilities and improve software security
c) To change software design
d) To increase system storage
Show Answer
Correct Answer: b) To fix vulnerabilities and improve software security
Explanation: A security patch is designed to fix vulnerabilities in software and improve its security by addressing identified issues that could be exploited by attackers, thereby enhancing overall system protection.
Q94. What is a ‘brute force attack’?
a) A method of encrypting data
b) A technique for gaining unauthorized access by trying numerous combinations of passwords
c) A tool for optimizing network traffic
d) A type of malware infection
Show Answer
Correct Answer: b) A technique for gaining unauthorized access by trying numerous combinations of passwords
Explanation: A brute force attack involves trying numerous combinations of passwords or encryption keys until the correct one is found, often used to gain unauthorized access to accounts or systems by exploiting weak or easily guessable passwords.
Q95. How does ‘two-factor authentication’ (2FA) enhance security?
a) By providing a single password for access
b) By requiring two separate forms of verification before granting access
c) By increasing internet speed
d) By simplifying password management
Show Answer
Correct Answer: b) By requiring two separate forms of verification before granting access
Explanation: Two-factor authentication (2FA) enhances security by requiring two separate forms of verification, such as a password and a one-time code sent to a mobile device, making it more difficult for unauthorized users to gain access.
Q96. What is ‘network monitoring’?
a) A method for increasing network bandwidth
b) The process of observing network activity to detect and respond to security threats
c) A tool for managing network performance
d) A technique for optimizing data storage
Show Answer
Correct Answer: b) The process of observing network activity to detect and respond to security threats
Explanation: Network monitoring involves observing network activity to detect and respond to security threats and anomalies, helping to maintain network security and performance by identifying potential issues in real-time.
Q97. What is the ‘CIA triad’ in information security?
a) Confidentiality, Integrity, and Availability
b) Confidentiality, Identity, and Access
c) Control, Integrity, and Access
d) Communication, Integrity, and Authentication
Show Answer
Correct Answer: a) Confidentiality, Integrity, and Availability
Explanation: The CIA triad in information security refers to Confidentiality, Integrity, and Availability. These are fundamental principles for protecting information and ensuring that it is kept private, accurate, and accessible to authorized users.
Q98. What is ‘data encryption’?
a) A method for improving internet speed
b) The process of converting data into a secure format to prevent unauthorized access
c) A tool for managing system performance
d) A technique for increasing file storage
Show Answer
Correct Answer: b) The process of converting data into a secure format to prevent unauthorized access
Explanation: Data encryption is the process of converting data into a secure format that can only be read or decrypted by authorized users. It protects sensitive information from unauthorized access and ensures data confidentiality.
Q99. What does ‘security awareness training’ aim to achieve?
a) Improving software performance
b) Educating users about potential security threats and safe practices
c) Enhancing network bandwidth
d) Managing system updates
Show Answer
Correct Answer: b) Educating users about potential security threats and safe practices
Explanation: Security awareness training aims to educate users about potential security threats, such as phishing and malware, and promote safe practices to prevent security breaches and protect sensitive information.
Q100. What is ‘identity theft’?
a) A method for securing personal data
b) The act of using someone else’s personal information without their permission for fraudulent purposes
c) A tool for increasing system performance
d) A type of data encryption
Show Answer
Correct Answer: b) The act of using someone else’s personal information without their permission for fraudulent purposes
Explanation: Identity theft involves using someone else’s personal information, such as Social Security numbers or credit card details, without permission to commit fraud or other criminal activities, often leading to financial and reputational harm.