What does the acronym CIA stand for in information security?
Confidentiality, Integrity, Availability
True or False: A firewall can prevent all types of cyber attacks.
False
Fill in the blank: _______ is the process of converting plaintext into ciphertext.
Encryption
What type of attack involves overwhelming a system with traffic?
Denial of Service (DoS)
Which protocol is commonly used for secure data transmission?
HTTPS
What is the primary purpose of an Intrusion Detection System (IDS)?
To monitor network traffic for suspicious activity
True or False: Multi-factor authentication requires two or more verification methods.
True
What is the term for a security breach that involves unauthorized access to data?
Data breach
Which of the following is a common method for securing wireless networks? (a) WEP (b) WPA2 (c) Both
b) WPA2
What does the term ‘phishing’ refer to?
A method of tricking individuals into providing sensitive information
Fill in the blank: _______ is a type of malware that can replicate itself.
Virus
What is the primary function of a VPN?
To create a secure connection over the internet
True or False: Social engineering attacks rely on technical vulnerabilities.
False
What is the difference between symmetric and asymmetric encryption?
Symmetric uses the same key for encryption and decryption, while asymmetric uses a pair of keys.
Which of the following is an example of a strong password? (a) 123456 (b) Password (c) P@ssw0rd123!
c) P@ssw0rd123!
What is a common use for a digital certificate?
To verify the identity of a website or user
Fill in the blank: A _______ is a software application designed to detect and remove malware.
Antivirus
What does the term ‘zero-day exploit’ mean?
An attack that occurs on the same day a vulnerability is discovered
True or False: Regular software updates can help protect against security vulnerabilities.
True
What is the purpose of a security policy?
To define the rules and procedures for maintaining security within an organization
What type of malware is designed to hold a user’s data hostage?
Ransomware
Which of the following is a risk associated with using public Wi-Fi? (a) Data interception (b) Enhanced performance (c) Secure connections
a) Data interception
What is an example of a physical security control?
Security cameras
Fill in the blank: _______ is the practice of assessing a system for vulnerabilities.
Penetration testing