Q81. What is a ‘virus’ in the context of cyber security?
a) A type of encryption method
b) A malicious program that replicates itself and spreads to other systems
c) A tool for enhancing system performance
d) A method for improving network speed
Show Answer
Correct Answer: b) A malicious program that replicates itself and spreads to other systems
Explanation: A virus is a type of malicious program that attaches itself to legitimate files and replicates, spreading to other systems and potentially causing harm by corrupting data or disrupting operations.
Q82. What is ’email spoofing’?
a) Sending legitimate emails with encryption
b) Creating fake email addresses to deceive recipients
c) Enhancing email security features
d) Managing email spam filters
Show Answer
Correct Answer: b) Creating fake email addresses to deceive recipients
Explanation: Email spoofing involves creating fake email addresses to deceive recipients into believing the email is from a trusted source, often used in phishing attacks to trick individuals into disclosing personal information.
Q83. What is the purpose of ‘password complexity’?
a) To increase the length of passwords
b) To make passwords more difficult to guess or crack
c) To simplify password management
d) To decrease the number of password changes
Show Answer
Correct Answer: b) To make passwords more difficult to guess or crack
Explanation: Password complexity involves creating passwords with a combination of letters, numbers, and special characters to make them more difficult for attackers to guess or crack, enhancing overall security.
Q84. What does ‘data breach’ refer to?
a) Regular updates to software
b) Unauthorized access and retrieval of sensitive data
c) Increased network bandwidth
d) Enhanced system performance
Show Answer
Correct Answer: b) Unauthorized access and retrieval of sensitive data
Explanation: A data breach refers to an incident where unauthorized individuals gain access to and retrieve sensitive data, often resulting in data theft, privacy violations, and potential harm to affected individuals or organizations.
Q85. How can you avoid falling victim to ‘social engineering’ attacks?
a) By using a simple password
b) By verifying the identity of individuals requesting sensitive information
c) By sharing personal details freely
d) By ignoring all security warnings
Show Answer
Correct Answer: b) By verifying the identity of individuals requesting sensitive information
Explanation: To avoid falling victim to social engineering attacks, it is crucial to verify the identity of individuals requesting sensitive information before disclosing any data, as social engineers often use deception to exploit trust.
Q86. What is a ‘public Wi-Fi network’ known for in terms of security risks?
a) Being highly secure and encrypted
b) Providing high-speed internet access
c) Being prone to interception and unauthorized access
d) Offering limited network bandwidth
Show Answer
Correct Answer: c) Being prone to interception and unauthorized access
Explanation: Public Wi-Fi networks are known for security risks due to their open nature, which makes them susceptible to interception and unauthorized access. Users should avoid accessing sensitive information on such networks or use a VPN for added security.
Q87. What does ‘regularly updating software’ help to prevent?
a) High internet usage
b) Outdated system features
c) Security vulnerabilities and potential exploits
d) Increased file storage
Show Answer
Correct Answer: c) Security vulnerabilities and potential exploits
Explanation: Regularly updating software helps prevent security vulnerabilities and potential exploits by applying patches and fixes that address known issues, reducing the risk of cyber attacks and ensuring better protection for the system.
Q88. What is a ‘security audit’?
a) A process of evaluating system performance
b) A thorough examination of security measures and practices
c) A method for increasing storage capacity
d) A tool for managing network traffic
Show Answer
Correct Answer: b) A thorough examination of security measures and practices
Explanation: A security audit involves a thorough examination of security measures and practices to identify weaknesses and ensure that security policies and controls are effectively implemented to protect against threats.
Q89. How can you recognize a ‘phishing email’?
a) It includes a green padlock icon
b) It contains urgent or threatening language and requests personal information
c) It has a standard email signature
d) It provides contact details for customer support
Show Answer
Correct Answer: b) It contains urgent or threatening language and requests personal information
Explanation: A phishing email often uses urgent or threatening language to create a sense of urgency and requests personal information from the recipient. Recognizing these signs can help identify and avoid falling victim to phishing scams.
Q90. What is the purpose of ‘backup copies’ in data security?
a) To increase storage capacity
b) To create additional copies of data for recovery in case of loss or corruption
c) To enhance system performance
d) To manage network traffic
Show Answer
Correct Answer: b) To create additional copies of data for recovery in case of loss or corruption
Explanation: Backup copies are created to ensure data recovery in case of loss, corruption, or hardware failure. Regular backups protect against data loss and provide a way to restore information to a secure state.