Quiz on IT Fundamentals for Cybersecurity Specialization Certification

cybersecurity Certificate

Organizer : The Digital Adda

Table of Contents

About the Quiz

Exam Details
  • Format: Multiple Choice Question
  • Questions: 10
  • Passing Score: 8/10 or 80%
  • Language: English
  • you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.

Apply Link

What does the term “phishing” refer to in the context of cybersecurity?
*
10/10
a) Protecting sensitive data with encryption
b) Sending malicious software through email attachments
c) Unauthorized access to computer networks
d) Deceiving individuals to reveal confidential information

Which of the following is NOT a common authentication factor?
*
10/10
a) Something you know
b) Something you have
c) Something you are
d) Something you like

A firewall is used primarily to:
*
10/10
a) Protect physical devices from theft
b) Filter out unwanted network traffic
c) Encrypt stored data
d) Accelerate internet connection speeds

What is the purpose of a Virtual Private Network (VPN) in cybersecurity?
*
10/10
a) To secure physical access to servers
b) To block all incoming network traffic
c) To establish an encrypted connection over an untrusted network
d) To scan for viruses and malware on user devices

What does the term “zero-day vulnerability” refer to?
*
10/10
a) A software bug that has existed for a long time
b) A security flaw that has been patched by the vendor
c) A vulnerability that is exploited before a fix is available
d) A type of phishing attack involving zero emails

Which encryption protocol is commonly used to secure web traffic (HTTPS)?
*
10/10
a) WPA2
b) AES
c) SSL/TLS
d) MD5

What is the purpose of a penetration test (pen test) in cybersecurity?
*
10/10
a) To detect and remove viruses from a network
b) To simulate an attack to identify vulnerabilities
c) To create secure backups of important data
d) To monitor network traffic in real-time

Biometric authentication relies on:
*
10/10
a) Passwords and PINs
b) Physical tokens
c) Human physiological and behavioral characteristics
d) Encrypted certificates

Which of the following best describes social engineering in cybersecurity?
*
10/10
a) Using physical barriers to prevent unauthorized access
b) Exploiting human psychology to gain unauthorized access
c) Enhancing network performance using hardware accelerators
d) Encrypting sensitive data during transmission

What does the term “malware” stand for?
*
10/10
a) Malicious Software
b) Mandatory Access Requirement List
c) Master Application Registry Locator
d) Mobile Application Resource Library

error: Content is protected !!
Scroll to Top