IT security
here will be questions about IT security, good luck
1. Which of the following is an example of a strong password?
-
123456
-
password
-
P@ssw0rd!2024
-
qwertyuiop
2. What is the purpose of two-factor authentication?
-
to make it easier for users to log in
-
To make it more difficult for hackers to gain access to an account
-
To reduce the number of passwords users need to remember
-
To allow users to share their passwords securely
3. What is the most common way for hackers to gain access to a computer or network?
A) Brute Force Attack
B) Social Engineering
C) Denial of Service Attack
D) SQL Injection Attack
-
Brute Force Attack
-
Social Engineering
-
Denial of Service Attack
-
SQL Injection Attack
4. Which of the following is an example of phishing?
-
A hacker sends an email with a link to a fake website that looks like a legitimate site
-
A hacker sends an email with a malicious attachment
-
A user accidentally downloads malware from a website
-
A hacker gains access through an unsecured Wi-Fi network
5. What does VPN stand for?
A) Virtual Public Network
B) Virtual Private Network
C) Verified Private Network
D) Virtual Protected Network
-
Virtual Public Network
-
Virtual Private Network
-
Verified Private Network
-
Virtual Protected Network
6. Which type of attack involves tricking users into revealing sensitive information by posing as a legitimate entity?
-
Phishing
-
Brute Force
-
Man-in-the-Middle
-
SQL Injection
7. What is the purpose of antivirus software?
-
To enhance system performance
-
To protect against malware and viruses
-
To increase internet speed
-
To manage user accounts
8. What is social engineering in the context of cybersecurity?
-
None of the above
-
An engineering principle for software development
-
Manipulating individuals into divulging confidential information
-
The use of social media for marketing purposes
9. Which of the following is a common sign of malware infection?
-
Frequent pop-up ads
-
All applications running smoothly
-
Improved system performance
-
Increased internet speed
10. What is the purpose of user access management in IT security?
-
Managing physical access to data centers
-
Establishing secure connections between networks
-
Scanning for malware and viruses
-
Managing user access to resources based on their authorization level
11. What is the term used to describe a deliberate attack on a system or network that aims to exploit vulnerabilities?
-
Data breach
-
Denial-of-service attack
-
Phishing attack
-
Cyber attack
12. What is the term for a piece of code that exploits a specific vulnerability in software?
A. Exploit
B. Virus
C. Worm
D. Trojan
-
Worm
-
Trojan
-
Virus
-
Exploit
13. What is the primary goal of IT security?
-
Preventing unauthorized access and safeguarding data
-
Maximizing system availability for all users
-
Ensuring fast and efficient network performance
-
Protecting computer systems from physical damage
14. What does the term “patching” refer to in cybersecurity?
-
Auditing network traffic for security breaches
-
Training employees to recognize and respond to cybersecurity threats
-
Updating software to address known vulnerabilities and improve security
-
Protecting physical assets in a data center
15. What does SSL stand for?
-
Simple Security Layer
-
Secure Socket Layer
-
Secure Server Login
-
System Security Level
16. What does the term “firewall” refer to in IT security?
-
Protecting physical assets in a data center
-
Monitoring network traffic for anomalies
-
Controlling network traffic and preventing unauthorized access
-
Managing user access to resources based on their authorization level
17. What is the purpose of a data loss prevention (DLP) system?
-
Encrypting data during transmission
-
Managing user access to resources
-
Scanning for malware and viruses
-
Monitoring and preventing unauthorized access to sensitive data
18. What is the term used to describe a deliberate attack on a system or network that aims to exploit vulnerabilities?
-
Cyber attack
-
Phishing attack
-
Denial-of-service attack
-
Data breach
19. What does "DDoS" stand for?
-
Distributed Denial of Service
-
Direct Denial of Service
-
Data Distribution of Service
-
Digital Domain of Service
20. What is the primary goal of penetration testing?
-
To identify vulnerabilities in systems before malicious actors can exploit them
-
To create backups of critical data
-
To monitor network traffic for suspicious activity
-
To develop new software applications
21. Which type of malware disguises itself as legitimate software but performs malicious actions?
-
Adware
-
Ransomware
-
Trojan
-
Spyware
22. What is the main purpose of hashing algorithms like SHA-256?
-
C. To compress data
-
B. To verify the integrity of data
-
D. To generate random numbers
-
A. To encrypt data
23. What is the primary function of a proxy server?
-
To perform penetration tests
-
To act as an intermediary between clients and other servers
-
To store backup copies of data
-
. To encrypt all network traffic
24. What is the difference between a worm and a virus?
-
There is no significant difference between the two.
-
A worm is less harmful than a virus.
-
A worm is slower than a virus.
-
A worm replicates itself without attaching to another program; a virus needs to attach to a host file.
25. What is the name of the protocol used to secure email communications?