0

Cybersecurity and Information Security

Description: This quiz covers the fundamental concepts, threats, and measures related to Cybersecurity and Information Security.
Number of Questions: 15
Created by:
Tags: cybersecurity information security data protection network security
Attempted 0/15 Correct 0 Score 0

What is the primary objective of Cybersecurity?

  1. To ensure the confidentiality, integrity, and availability of information.

  2. To monitor and analyze network traffic.

  3. To develop and implement security policies.

  4. To respond to security incidents.


Correct Option: A
Explanation:

Cybersecurity aims to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction.

Which of the following is a common type of cyberattack that involves tricking individuals into revealing sensitive information?

  1. Phishing

  2. Malware

  3. DDoS

  4. SQL Injection


Correct Option: A
Explanation:

Phishing attacks attempt to obtain sensitive information, such as passwords or credit card numbers, by posing as legitimate entities.

What is the purpose of a firewall in a network security architecture?

  1. To monitor and filter incoming and outgoing network traffic.

  2. To encrypt data transmitted over the network.

  3. To detect and prevent unauthorized access to a network.

  4. To provide secure remote access to a network.


Correct Option: A
Explanation:

A firewall acts as a barrier between a network and the Internet, monitoring and filtering traffic to prevent unauthorized access.

Which of the following is a type of malware that encrypts files on a victim's computer and demands a ransom payment to decrypt them?

  1. Virus

  2. Trojan Horse

  3. Ransomware

  4. Worm


Correct Option: C
Explanation:

Ransomware encrypts files on a victim's computer and demands a ransom payment to decrypt them, making them inaccessible.

What is the process of identifying, assessing, and prioritizing information security risks known as?

  1. Risk Assessment

  2. Vulnerability Assessment

  3. Penetration Testing

  4. Incident Response


Correct Option: A
Explanation:

Risk assessment involves identifying, assessing, and prioritizing information security risks to determine their potential impact and likelihood.

Which of the following is a common security measure used to protect data during transmission over a network?

  1. Encryption

  2. Authentication

  3. Authorization

  4. Non-Repudiation


Correct Option: A
Explanation:

Encryption involves converting data into a form that cannot be easily understood or accessed by unauthorized individuals.

What is the process of detecting, responding to, and recovering from security incidents known as?

  1. Incident Response

  2. Risk Assessment

  3. Vulnerability Assessment

  4. Penetration Testing


Correct Option: A
Explanation:

Incident response involves detecting, responding to, and recovering from security incidents to minimize their impact and prevent future occurrences.

Which of the following is a type of cyberattack that involves flooding a target system with excessive traffic to disrupt its normal operations?

  1. DDoS

  2. Phishing

  3. Malware

  4. SQL Injection


Correct Option: A
Explanation:

DDoS (Distributed Denial of Service) attacks involve flooding a target system with excessive traffic to disrupt its normal operations.

What is the process of testing a system's security by simulating an attack to identify vulnerabilities known as?

  1. Penetration Testing

  2. Vulnerability Assessment

  3. Risk Assessment

  4. Incident Response


Correct Option: A
Explanation:

Penetration testing involves simulating an attack on a system to identify vulnerabilities and assess its security posture.

Which of the following is a common security measure used to control access to resources based on user roles and permissions?

  1. Authentication

  2. Authorization

  3. Encryption

  4. Non-Repudiation


Correct Option: B
Explanation:

Authorization involves controlling access to resources based on user roles and permissions, determining who can access what.

What is the process of verifying the identity of a user or system known as?

  1. Authentication

  2. Authorization

  3. Encryption

  4. Non-Repudiation


Correct Option: A
Explanation:

Authentication involves verifying the identity of a user or system to ensure they are who they claim to be.

Which of the following is a common security measure used to prevent unauthorized access to a network or system?

  1. Firewall

  2. Intrusion Detection System

  3. Antivirus Software

  4. Secure Socket Layer (SSL)


Correct Option: A
Explanation:

A firewall acts as a barrier between a network or system and the Internet, monitoring and filtering traffic to prevent unauthorized access.

What is the process of ensuring that a message or data cannot be denied by the sender or receiver known as?

  1. Authentication

  2. Authorization

  3. Encryption

  4. Non-Repudiation


Correct Option: D
Explanation:

Non-repudiation ensures that a message or data cannot be denied by the sender or receiver, providing proof of its origin and integrity.

Which of the following is a common security measure used to protect data at rest on a storage device?

  1. Encryption

  2. Authentication

  3. Authorization

  4. Non-Repudiation


Correct Option: A
Explanation:

Encryption involves converting data at rest on a storage device into a form that cannot be easily understood or accessed by unauthorized individuals.

What is the process of identifying, classifying, and protecting sensitive information known as?

  1. Data Classification

  2. Risk Assessment

  3. Vulnerability Assessment

  4. Penetration Testing


Correct Option: A
Explanation:

Data classification involves identifying, classifying, and protecting sensitive information based on its confidentiality, integrity, and availability requirements.

- Hide questions