Q71. What is ‘cyber hygiene’?
a) Regular maintenance of network hardware
b) Best practices and habits to maintain security and prevent cyber threats
c) Cleaning physical devices
d) Updating software for performance enhancement
Show Answer
Correct Answer: b) Best practices and habits to maintain security and prevent cyber threats
Explanation: Cyber hygiene refers to the best practices and habits that individuals and organizations follow to maintain security and prevent cyber threats, including regular updates, strong passwords, and awareness of potential risks.
Q72. How can you recognize a secure website?
a) By checking for a green padlock icon and HTTPS in the URL
b) By the website’s color scheme
c) By the number of advertisements on the website
d) By the website’s page load speed
Show Answer
Correct Answer: a) By checking for a green padlock icon and HTTPS in the URL
Explanation: A secure website is indicated by a green padlock icon and HTTPS in the URL, signifying that the website uses encryption to protect data transmitted between the server and the browser.
Q73. What is ‘social engineering’?
a) A type of network security protocol
b) Manipulating individuals into divulging confidential information
c) A method of data encryption
d) A software development technique
Show Answer
Correct Answer: b) Manipulating individuals into divulging confidential information
Explanation: Social engineering involves manipulating individuals into revealing confidential information, such as passwords or personal details, through deceptive tactics designed to exploit human psychology and trust.
Q74. What is the primary function of a firewall in network security?
a) To block all incoming and outgoing traffic
b) To monitor and control network traffic based on security rules
c) To enhance network speed
d) To increase network bandwidth
Show Answer
Correct Answer: b) To monitor and control network traffic based on security rules
Explanation: A firewall monitors and controls network traffic based on predefined security rules, helping to protect systems from unauthorized access and potential cyber threats by filtering and blocking malicious traffic.
Q75. What is the purpose of regular software updates?
a) To add new features
b) To fix security vulnerabilities and improve software performance
c) To increase software cost
d) To change software design
Show Answer
Correct Answer: b) To fix security vulnerabilities and improve software performance
Explanation: Regular software updates address security vulnerabilities and improve performance by fixing bugs, patching vulnerabilities, and ensuring compatibility with the latest technologies and standards.
Q76. What is a ‘spyware’?
a) A tool for protecting against viruses
b) Malicious software designed to collect user information without their knowledge
c) A type of secure email service
d) Software used for enhancing computer graphics
Show Answer
Correct Answer: b) Malicious software designed to collect user information without their knowledge
Explanation: Spyware is malicious software that secretly collects user information, such as browsing habits and personal data, without the user’s consent, often leading to privacy violations and security risks.
Q77. What is ‘malware’?
a) Software designed to improve system performance
b) A term for malicious software intended to harm or exploit devices
c) A tool for managing system files
d) Software for network optimization
Show Answer
Correct Answer: b) A term for malicious software intended to harm or exploit devices
Explanation: Malware is a broad term for any malicious software designed to harm, exploit, or otherwise compromise a device or network, including viruses, worms, trojans, and ransomware.
Q78. What is ‘phishing’ commonly used to obtain?
a) Personal or financial information
b) High-speed internet access
c) New software updates
d) Increased device storage
Show Answer
Correct Answer: a) Personal or financial information
Explanation: Phishing is commonly used to deceive individuals into providing personal or financial information by pretending to be a legitimate entity, often through fake emails or websites designed to steal sensitive data.
Q79. What is a ‘DDoS attack’?
a) An attack that encrypts data and demands a ransom
b) A coordinated attack that overwhelms a network or website with traffic
c) A method for decrypting sensitive data
d) An attack that targets individual devices for data theft
Show Answer
Correct Answer: b) A coordinated attack that overwhelms a network or website with traffic
Explanation: A DDoS (Distributed Denial of Service) attack involves overwhelming a network or website with excessive traffic from multiple sources, causing disruption or shutdown of services and rendering the target inaccessible.
Q80. What does ‘encryption’ help to protect?
a) Computer performance
b) Data confidentiality and integrity
c) Network bandwidth
d) System speed
Show Answer
Correct Answer: b) Data confidentiality and integrity
Explanation: Encryption helps protect data confidentiality and integrity by converting information into a secure format that is unreadable without the appropriate decryption key, ensuring that sensitive data remains private and unaltered.