0% found this document useful (0 votes)
11 views

Tutorial Question for level4 Cyber Security

The document consists of a series of tutorial questions related to Cyber Security, covering topics such as the primary goals of Cyber Security, types of cyber attacks, data protection techniques, and security protocols. It includes multiple-choice questions that assess knowledge on various aspects of cyber threats, vulnerabilities, and protective measures. The questions aim to educate readers on key concepts and terminology in the field of Cyber Security.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Tutorial Question for level4 Cyber Security

The document consists of a series of tutorial questions related to Cyber Security, covering topics such as the primary goals of Cyber Security, types of cyber attacks, data protection techniques, and security protocols. It includes multiple-choice questions that assess knowledge on various aspects of cyber threats, vulnerabilities, and protective measures. The questions aim to educate readers on key concepts and terminology in the field of Cyber Security.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Tutorial Question for Cyber Security

1. What is the primary goal of Cyber Security?


a) To create passwords
b) To protect information and systems from unauthorized access, use,
disclosure, disruption, modification, or destruction
c) To install antivirus software on all advices
d) To monotor employee internet usage
2. Which of the following DDoS in mobile systems wait for the owner to trigger the
cyber attack?
a) Botnets
b) Programs
c) Virus
d) Worms
3. In a phishing, attackers target the ________ technology to so social engineering.
a) Emails
b) WI-FI network
c) Operating systems
d) Surveillance camera
4. When you use the word _____ it means you are protecting your data from getting
disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
5. One common way to maintain data availability is __________
a) Data clustering
b) Data backup
c) Data recovery
d) Data Altering
6. Which of the following term refers to a group of hackers who are both white and
black hat?
a) Yellow Hat hackers
b) Grey Hat hackers
c) Red Hat Hackers
d) White-Black Hat Hackers
7. Data ___________ is used to ensure confidentiality.
a) Encryption
b) Locking
c) Deleting
d) Backup
8. What is the main purpose of Virtual Private Network (VPN)?
a) To encrypt data
b) To detect viruses
c) To backup data
d) To create a secure connnection over a public network
9. Which of the following is not an example of offline password attack?
a) Dictionary attack
b) Rainbow attacks
c) Brute force attack
d) Spamming attack
10. An/A ________ is an act that violates cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack
11. Which of the following is used for encrypting data at network level?
a) IPSec
b) HTTPS
c) SMTP
d) S/MIME
12. Firewall examines each ____________ that are entering or leaving the internal
network.
a) Emails users
b) Updates
c) Data packets
d) Connections
13. _______is the technique used in business organizations and firms to protect IT
assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
14. What is a cyber threat?
a) A weakness in a system that can be exploited
b) A potential danger that can exploit a vulnerability to breach security and case
harm
c) A type of antivirus software
d) A secure method of data transmission
15. What is phishing attack?
a) A technique used to catch hackers
b) A method of encrypting data
c) A fraudulent attempt to obtain sensitive information, such as usernames,
passwords, and credit card details by disguising oneself as a trustworthy
entity
d) A type of network security protocol
16. Which of the following attacks targets websites by injecting malicious scripts into
web pages viewed by other users?
a) SQL injection
b) Cross-Site Scripting (XSS)
c) Zero-Day Attack
d) DDoS Attack
17. In an any organization, company or firm the policies of information security come
under__________
a) CIA Triad
b) Confidentiality
c) Authenticity
d) None of the above
18. Which of the following usually observe each activity on the internet of the victim,
gather all information in the background, and send it to someone else?
a) Malware
b) Spyware
c) Adware
d) All of the above
19. _______ is a type of software designed to help the user's computer detect
viruses and avoid them.
a) Malware
b) Adware
c) Antivirus
d) Both B and C
20. It can be a software program or a hardware device that filters all data packets
coming through the internet, a network, etc. it is known as the_______:
a) Antivirus
b) Firewall
c) Cookies
d) Malware
21. Which of the following refers to stealing one's idea or invention of others and use
it for their own benefits?
a) Piracy
b) Plagiarism
c) Intellectual property rights
d) All of the above
22. Which of the following refers to the violation of the principle if a computer is no
more accessible?
a) Access control
b) Confidentiality
c) Availability
d) All of the above
23. Which of the following can be considered as the elements of cyber security?
a) Application Security
b) Operational Security
c) Network Security
d) All of the above
24. What is a Zero-Day Attack?
a) An attack that occurs on the first day of the month
b) An attack that exploits a previously unknown vulnerability
c) An attack that targets zero-day vulnerabilities
d) An attack that takes zero days to execute
25. What is the difference between a vulnerability scan and a penetration test?
a) A vulnerability scan only identifies vulnerabilities, while a penetration test
attempts to exploit them
b) A vulnerability scan is more expensive than a penetration test
c) A vulnerability scan is performed manually, while a penetration test is
automated
d) There is no difference between a vulnerability scan and a penetration test

You might also like