Cyber Security - Study24x7
Social learning Network
cybersecurity1 Cover image
cybersecurity1
Cyber Security
  • Followers
  • Latest Feeds
  • Articles
  • Question
  • Course
  • About
  • Review
Interests
Devops Cyber Security
4 followers study24x7 09 Dec 2024 11:47 AM study24x7 study24x7

What is the primary function of an Intrusion Detection System (IDS)?

A

To block unauthorized access

B

To detect unauthorized activities in a system or network

C

To encrypt sensitive data

D

To optimize network speed

study24x7
Write a comment
4 followers study24x7 06 Dec 2024 09:58 AM study24x7 study24x7

Which cybersecurity principle is related to ensuring that data has not been altered?

A

Confidentiality

B

Availability

C

Integrity

D

Authentication

study24x7
Write a comment
4 followers study24x7 06 Dec 2024 09:57 AM study24x7 study24x7

Which term refers to unwanted and unsolicited emails?

A

Phishing emails

B

Spam

C

Malware emails

D

Trojan emails

study24x7
Write a comment
4 followers study24x7 06 Dec 2024 09:57 AM study24x7 study24x7

What does "patch management" refer to?

A

Adding new features to software

B

Updating software to fix vulnerabilities

C

Removing unused software

D

Installing firewalls

study24x7
Write a comment
4 followers study24x7 05 Dec 2024 10:52 AM study24x7 study24x7

What is the role of a CAPTCHA?

A

Prevent automated bots from accessing systems

B

Encrypt user data

C

Authenticate devices

D

Scan for malware

study24x7
Write a comment
4 followers study24x7 05 Dec 2024 10:52 AM study24x7 study24x7

What is the key difference between HTTPS and HTTP?

A

HTTPS is faster

B

HTTPS uses encryption for secure communication

C

HTTP is more secure than HTTPS

D

They are the same

study24x7
Write a comment
4 followers study24x7 05 Dec 2024 10:50 AM study24x7 study24x7

What is a botnet?

A

A network of computers working together on a project

B

A group of computers infected and controlled by a hacker

C

An AI network for security

D

A cloud computing system

study24x7
Write a comment
4 followers study24x7 04 Dec 2024 01:11 PM study24x7 study24x7

What is the main purpose of ethical hacking?

A

To expose vulnerabilities for malicious purposes

B

To secure systems by identifying and fixing vulnerabilities

C

To create malware for testing

D

To simulate user behavior

study24x7
Write a comment
4 followers study24x7 04 Dec 2024 01:11 PM study24x7 study24x7

Which cybersecurity tool scans for malware?

A

VPN

B

Antivirus

C

Firewall

D

DNS

study24x7
Write a comment
4 followers study24x7 04 Dec 2024 01:10 PM study24x7 study24x7

What is SQL injection?

A

Inserting code into databases via SQL queries

B

Removing data from a database

C

Encrypting SQL tables

D

Testing database security

study24x7
Write a comment
4 followers study24x7 03 Dec 2024 10:24 AM study24x7 study24x7

What is spyware?

A

Software to spy on devices for data theft

B

A security software

C

A tool for ethical hacking

D

An antivirus program

study24x7
Write a comment
4 followers study24x7 03 Dec 2024 10:23 AM study24x7 study24x7

What does CIA triad stand for in cybersecurity?

A

Confidentiality, Integrity, Availability

B

Central Intelligence Agency

C

Communication, Information, Application

D

Critical Infrastructure Analysis

study24x7
Write a comment
4 followers study24x7 03 Dec 2024 10:23 AM study24x7 study24x7

What is a zero-day vulnerability?

A

A virus discovered within 24 hours

B

A security flaw exploited before it is known or patched

C

A bug fixed on the same day

D

A planned malware attack

study24x7
Write a comment
4 followers study24x7 02 Dec 2024 10:56 AM study24x7 study24x7

What is the purpose of penetration testing?

A

To hack systems maliciously

B

To evaluate security by simulating cyberattacks

C

To develop malware

D

To remove viruses

study24x7
Write a comment
4 followers study24x7 02 Dec 2024 10:55 AM study24x7 study24x7

Which of the following is an example of multi-factor authentication?

A

Username and password

B

Password and CAPTCHA

C

Password and fingerprint scan

D

Password and security question

study24x7
Write a comment
4 followers study24x7 02 Dec 2024 10:30 AM study24x7 study24x7

What is the weakest point in a security system?

A

Hardware

B

Software

C

Human factor

D

Network

study24x7
Write a comment
4 followers study24x7 29 Nov 2024 10:28 AM study24x7 study24x7

What is the purpose of encryption?

A

To increase data transfer speed

B

To prevent unauthorized data access by converting it into a secure format

C

To compress files

D

To store data efficiently

study24x7
Write a comment
4 followers study24x7 29 Nov 2024 10:28 AM study24x7 study24x7

Which of these is an example of social engineering?

A

SQL Injection

B

Phishing

C

DNS Spoofing

D

Malware attack

study24x7
Write a comment
4 followers study24x7 29 Nov 2024 10:27 AM study24x7 study24x7

What is two-factor authentication (2FA)?

A

Using two passwords for login

B

Combining username and password

C

Using two different methods to verify identity

D

Using a single strong password

study24x7
Write a comment
4 followers study24x7 28 Nov 2024 10:02 AM study24x7 study24x7

What does VPN stand for?

A

Virtual Private Network

B

Virtual Public Network

C

Variable Private Network

D

Verified Protocol Network

study24x7
Write a comment
Ratings
0.0
out of 5
0 Ratings
5 study24x7
 
0.0
4 study24x7
 
0.0
3 study24x7
 
0.0
2 study24x7
 
0.0
1 study24x7
 
0.0
Related Pages