問題一覧
1
What is the primary goal of cybersecurity?
Protecting computer systems and data
2
Which term refers to a malicious program that replicates itself and spreads to other computers?
Worm
3
What does the term "phishing" involve?
Stealing sensitive information through deceptive emails
4
Which authentication factor typically involves something you know?Which authentication factor typically involves something you know?
Password
5
What is the purpose of a firewall in cybersecurity?
Monitoring network traffic and blocking unauthorized access
6
What is a common practice to protect sensitive data in transit over a network?
Encryption
7
What is the principle behind "least privilege" in cybersecurity?
Users should have the least amount of access necessary to perform their job functions
8
What does the term "malware" stand for?
Malicious Software
9
What is a common method to secure a Wi-Fi network?
Using WPA3 (Wi-Fi Protected Access 3)
10
What is the purpose of a VPN (Virtual Private Network) in cybersecurity?
Providing a secure connection over the internet
11
What is the primary function of antivirus software?
Detecting and removing malicious software
12
What is the main purpose of a penetration test?
Testing the resilience of software against cyber attacks
13
Which of the following is an example of a strong password?
qR#2!pL9
14
What is the role of a Security Incident and Event Management (SIEM) system?
Monitoring and analyzing security events in real-time
15
What is the purpose of two-factor authentication (2FA)?
Providing an additional layer of security by using multiple authentication methods
16
What is a "zero-day exploit" in cybersecurity?
An exploit that targets previously unknown vulnerabilities
17
What does the term "social engineering" refer to?
Manipulating individuals to divulge confidential information
18
What is the purpose of data backup in cybersecurity?
Recovering lost or compromised data
19
What is the primary concern of ransomware attacks?
Encrypting files and demanding payment for their release
20
Which type of attack involves flooding a network or server with excessive traffic to make it unavailable?
DDoS (Distributed Denial of Service)