The document consists of a series of tutorial questions related to Cyber Security, covering topics such as the primary goals of Cyber Security, types of cyber attacks, data protection techniques, and security protocols. It includes multiple-choice questions that assess knowledge on various aspects of cyber threats, vulnerabilities, and protective measures. The questions aim to educate readers on key concepts and terminology in the field of Cyber Security.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
11 views
Tutorial Question for level4 Cyber Security
The document consists of a series of tutorial questions related to Cyber Security, covering topics such as the primary goals of Cyber Security, types of cyber attacks, data protection techniques, and security protocols. It includes multiple-choice questions that assess knowledge on various aspects of cyber threats, vulnerabilities, and protective measures. The questions aim to educate readers on key concepts and terminology in the field of Cyber Security.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
Tutorial Question for Cyber Security
1. What is the primary goal of Cyber Security?
a) To create passwords b) To protect information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction c) To install antivirus software on all advices d) To monotor employee internet usage 2. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack? a) Botnets b) Programs c) Virus d) Worms 3. In a phishing, attackers target the ________ technology to so social engineering. a) Emails b) WI-FI network c) Operating systems d) Surveillance camera 4. When you use the word _____ it means you are protecting your data from getting disclosed. a) Confidentiality b) Integrity c) Authentication d) Availability 5. One common way to maintain data availability is __________ a) Data clustering b) Data backup c) Data recovery d) Data Altering 6. Which of the following term refers to a group of hackers who are both white and black hat? a) Yellow Hat hackers b) Grey Hat hackers c) Red Hat Hackers d) White-Black Hat Hackers 7. Data ___________ is used to ensure confidentiality. a) Encryption b) Locking c) Deleting d) Backup 8. What is the main purpose of Virtual Private Network (VPN)? a) To encrypt data b) To detect viruses c) To backup data d) To create a secure connnection over a public network 9. Which of the following is not an example of offline password attack? a) Dictionary attack b) Rainbow attacks c) Brute force attack d) Spamming attack 10. An/A ________ is an act that violates cyber-security. a) Threat b) Vulnerability c) Exploit d) Attack 11. Which of the following is used for encrypting data at network level? a) IPSec b) HTTPS c) SMTP d) S/MIME 12. Firewall examines each ____________ that are entering or leaving the internal network. a) Emails users b) Updates c) Data packets d) Connections 13. _______is the technique used in business organizations and firms to protect IT assets. a) Ethical hacking b) Unethical hacking c) Fixing bugs d) Internal data-breach 14. What is a cyber threat? a) A weakness in a system that can be exploited b) A potential danger that can exploit a vulnerability to breach security and case harm c) A type of antivirus software d) A secure method of data transmission 15. What is phishing attack? a) A technique used to catch hackers b) A method of encrypting data c) A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity d) A type of network security protocol 16. Which of the following attacks targets websites by injecting malicious scripts into web pages viewed by other users? a) SQL injection b) Cross-Site Scripting (XSS) c) Zero-Day Attack d) DDoS Attack 17. In an any organization, company or firm the policies of information security come under__________ a) CIA Triad b) Confidentiality c) Authenticity d) None of the above 18. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else? a) Malware b) Spyware c) Adware d) All of the above 19. _______ is a type of software designed to help the user's computer detect viruses and avoid them. a) Malware b) Adware c) Antivirus d) Both B and C 20. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______: a) Antivirus b) Firewall c) Cookies d) Malware 21. Which of the following refers to stealing one's idea or invention of others and use it for their own benefits? a) Piracy b) Plagiarism c) Intellectual property rights d) All of the above 22. Which of the following refers to the violation of the principle if a computer is no more accessible? a) Access control b) Confidentiality c) Availability d) All of the above 23. Which of the following can be considered as the elements of cyber security? a) Application Security b) Operational Security c) Network Security d) All of the above 24. What is a Zero-Day Attack? a) An attack that occurs on the first day of the month b) An attack that exploits a previously unknown vulnerability c) An attack that targets zero-day vulnerabilities d) An attack that takes zero days to execute 25. What is the difference between a vulnerability scan and a penetration test? a) A vulnerability scan only identifies vulnerabilities, while a penetration test attempts to exploit them b) A vulnerability scan is more expensive than a penetration test c) A vulnerability scan is performed manually, while a penetration test is automated d) There is no difference between a vulnerability scan and a penetration test
Neural Information Processing 27th International Conference ICONIP 2020 Bangkok Thailand November 18 22 2020 Proceedings Part V Haiqin Yang 2024 scribd download