Organizer : The Digital Adda
About the Quiz
- Format: Multiple Choice Question
- Questions: 10
- Passing Score: 8/10 or 80%
- Language: English
- you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Apply Link
What does the term “phishing” refer to in the context of cybersecurity?
*
10/10
a) Protecting sensitive data with encryption
b) Sending malicious software through email attachments
c) Unauthorized access to computer networks
d) Deceiving individuals to reveal confidential information
Which of the following is NOT a common authentication factor?
*
10/10
a) Something you know
b) Something you have
c) Something you are
d) Something you like
A firewall is used primarily to:
*
10/10
a) Protect physical devices from theft
b) Filter out unwanted network traffic
c) Encrypt stored data
d) Accelerate internet connection speeds
What is the purpose of a Virtual Private Network (VPN) in cybersecurity?
*
10/10
a) To secure physical access to servers
b) To block all incoming network traffic
c) To establish an encrypted connection over an untrusted network
d) To scan for viruses and malware on user devices
What does the term “zero-day vulnerability” refer to?
*
10/10
a) A software bug that has existed for a long time
b) A security flaw that has been patched by the vendor
c) A vulnerability that is exploited before a fix is available
d) A type of phishing attack involving zero emails
Which encryption protocol is commonly used to secure web traffic (HTTPS)?
*
10/10
a) WPA2
b) AES
c) SSL/TLS
d) MD5
What is the purpose of a penetration test (pen test) in cybersecurity?
*
10/10
a) To detect and remove viruses from a network
b) To simulate an attack to identify vulnerabilities
c) To create secure backups of important data
d) To monitor network traffic in real-time
Biometric authentication relies on:
*
10/10
a) Passwords and PINs
b) Physical tokens
c) Human physiological and behavioral characteristics
d) Encrypted certificates
Which of the following best describes social engineering in cybersecurity?
*
10/10
a) Using physical barriers to prevent unauthorized access
b) Exploiting human psychology to gain unauthorized access
c) Enhancing network performance using hardware accelerators
d) Encrypting sensitive data during transmission
What does the term “malware” stand for?
*
10/10
a) Malicious Software
b) Mandatory Access Requirement List
c) Master Application Registry Locator
d) Mobile Application Resource Library