1/99
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the three main types of hazards from computers?
a) Electrical, Mechanical, Software
b) Information, Environmental, Health
c) Physical, Network, Cloud
d) Security, Physical, Psychological
b) Information, Environmental, Health
Which of the following is NOT a pillar of information security?
a) Confidentiality
b) Data integrity
c) Availability
d) Automation
d) Automation
What happened in the 2013 Target data breach?
a) Employees accidentally leaked customer data
b) A vendor’s credentials were used to install malware
c) A denial-of-service attack disrupted operations
d) Hackers accessed data through phishing
b) A vendor’s credentials were used to install malware
What is the primary goal of a ransomware attack?
a) To delete user files permanently
b) To encrypt files and demand payment for decryption
c) To steal banking information
d) To monitor user activity
b) To encrypt files and demand payment for decryption
Which attacker type is known for using pre-made hacking tools with little
expertise?
a) Hacktivists
b) Cyberterrorists
c) Script kiddies
d) Insiders
c) Script kiddies
Which of the following is NOT a common motivation for cyberattacks?
a) Extortion
b) Espionage
c) Improving cybersecurity awareness
d) Political activism
c) Improving cybersecurity awareness
Which of the following is an example of e-waste?
a) An old laptop discarded improperly
b) A password stored in a notebook
c) A cloud storage file
d) A deleted email
a) An old laptop discarded improperly
What does a firewall do?
a) Increases internet speed
b) Blocks unauthorized access to a network
c) Encrypts files automatically
d) Prevents computer overheating
b) Blocks unauthorized access to a network
What is social engineering?
a) Manipulating people into revealing confidential information
b) Using encryption to protect data
c) A technique to speed up networks
d) A method for organizing online groups
a) Manipulating people into revealing confidential information
What is pretexting?
a) Creating fake scenarios to obtain sensitive information
b) Sending fraudulent emails to gain user credentials
c) Encrypting user data without permission
d) Using a VPN to protect data
a) Creating fake scenarios to obtain sensitive information
Which type of malware spreads without human interaction?
a) Virus
b) Worm
c) Trojan
d) Ransomware
b) Worm
Which of the following is NOT an online risk?
a) Online banking fraud
b) E-commerce scams
c) Fake websites
d) Using a strong password
d) Using a strong password
What does two-factor authentication require?
a) Two passwords
b) A password and an additional security factor
c) Biometric data only
d) A firewall
b) A password and an additional security factor
What is phishing?
a) A method of tracking online users
b) A fraudulent attempt to obtain sensitive information
c) A software update for security
d) A virus removal technique
b) A fraudulent attempt to obtain sensitive information
Which security measure helps prevent unauthorized access to accounts?
a) Using a different password for each account
b) Sharing passwords with friends
c) Using only four-character passwords
d) Ignoring security updates
a) Using a different password for each account
What is a common sign of a phishing email?
a) A request for personal information from an unknown sender
b) A long, complex password suggestion
c) A message from a known sender without attachments
d) A notification from your antivirus software
a) A request for personal information from an unknown sender
Which of the following best describes “cyberstalking”?
a) A method for gathering secure data
b) Online harassment using digital tools
c) A security technique for tracking hackers
d) A government surveillance strategy
b) Online harassment using digital tools
What is the main goal of identity theft?
a) To gain unauthorized access to a system
b) To collect user credentials for lawful purposes
c) To steal personal information for financial fraud
d) To prevent malware attacks
c) To steal personal information for financial fraud
Which of the following is an example of an insider threat?
a) A hacker from another country
b) A cybercriminal using malware
c) An employee misusing company data
d) A denial-of-service attack
c) An employee misusing company data
What is an example of a secure password?
a) Password123
b) ILoveMyDog
c) !R8s&vT#zWm2@6L
d) 123456789
c) !R8s&vT#zWm2@6L
What is a major risk of using public Wi-Fi?
a) Improved internet speed
b) Data interception by attackers
c) Automatic software updates
d) Secure encryption for all traffic
b) Data interception by attackers
Which of the following best defines spyware?
a) A program that removes viruses
b) A program that secretly collects user data
c) A tool used for encryption
b) A program that secretly collects user data
Which type of malware is disguised as legitimate software?
a) Virus
b) Trojan
c) Worm
d) Ransomware
b) Trojan
What does social engineering rely on?
a) Encryption techniques
b) Network vulnerabilities
c) Psychological manipulation
d) Cloud computing
c) Psychological manipulation
What is an example of vishing?
a) A fake email requesting credentials
b) A fraudulent text message asking for account information
c) A phone call impersonating a bank to obtain user details
d) An attacker using an unauthorized USB device
c) A phone call impersonating a bank to obtain user details
What is the purpose of a digital certificate?
a) To encrypt a website
b) To verify a website's authenticity
c) To store passwords securely
d) To remove malware
b) To verify a website's authenticity
What is the best way to store backup data?
a) On the main computer hard drive
b) On multiple unsecured USB drives
c) On a separate external device or cloud storage
d) By emailing copies to yourself
c) On a separate external device or cloud storage
Which of the following is an example of spam?
a) A legitimate business email
b) An unsolicited email promoting products or scams
c) A notification from an antivirus program
d) A two-factor authentication request
b) An unsolicited email promoting products or scams
What type of hacker helps improve security by finding vulnerabilities?
a) Black hat hacker
b) Gray hat hacker
c) White hat hacker
d) Script kiddie
c) White hat hacker
What is shoulder surfing?
a) Watching someone enter their credentials without their knowledge
b) A method for tracking hackers
c) A software encryption technique
a) Watching someone enter their credentials without their knowledge
True or False:Cybersecurity only affects businesses, not individuals.
False
True or False: Multi-factor authentication increases security.
True
True or False: Encryption makes data unreadable without proper authorization.
True
True or False: Phishing is a type of social engineering attack
True
True or False: Hackers only target government organizations
False
True or False: A botnet consists of compromised computers used for malicious activities.
True
True or False: Cyberbullying is less harmful than traditional bullying.
False
True or False: Using strong passwords is a best practice for online security
True
True or False: Shoulder surfing is a technique where attackers observe people typing
passwords
True
True or False: A DoS attack floods a system with too much traffic, causing it to crash.
True
True or False: Firewalls prevent all cyberattacks
False
True or False: Updating software regularly helps protect against security vulnerabilities.
True
True or False: A brute-force attack systematically tries different password combinations.
True
True or False: Cybercriminals use social engineering to exploit human behavior
True
True or False: Using a VPN while on public Wi-Fi enhances security
True
True or False: Spam emails are always harmless.
False
True or False: Data breaches can lead to identity theft.
True
True or False: A ransomware attack locks or encrypts files until a ransom is paid.
true
True or False: Social engineering attacks only occur online
False
True or False: Pretexting involves pretending to be someone else to gain information.
True
T/F: Using the same password for multiple accounts is a secure practice.
False
T/F:E-waste disposal can harm the environment.
True
T/F:Cybersecurity training can help prevent phishing attacks
True
T/F: Two-factor authentication is less secure than using a strong password alone.
False
T/F: Cyberstalking is a form of online harassment.
True
T/F: Strong encryption can prevent unauthorized access to sensitive data.
True
T/F: Social engineering relies on technical vulnerabilities, not human weaknesses.
False
T/F:A white hat hacker helps organizations improve security
True
T/F:Ransomware is a type of malware that steals passwords.
False
T/F:A strong password should include a mix of letters, numbers, and special
characters.
True
T/F: Hacktivists attack computer systems for social or political reasons.
True
T/F: Personal information should not be shared on public forums.
True
T/F: A trojan disguises itself as legitimate software to gain access to a system
True
T/F: A firewall can detect and block unauthorized access to a network.
True
T/F: Monitoring financial statements can help detect identity theft early.
True
T/F: Firewalls can help prevent unauthorized access to networks.
True
T/F: Hackers always require direct access to a computer to carry out cyberattacks.
False
T/F: Ransomware encrypts a user's files and demands payment for decryption.
True
T/F: A strong password should be at least 8 characters long.
False
T/F: Using public Wi-Fi is always secure if the network has a password.
False
T/F: Two-factor authentication adds an extra layer of security to user accounts.
True
T/F: Malware can only spread through email attachments.
False
T/F: Social engineering attacks exploit human weaknesses rather than software
vulnerabilities.
True
T/F: DDoS attacks attempt to overwhelm a system with excessive traffic.
True
T/F:Clicking on unknown email links is a safe practice.
False
T/F:Strong passwords should not contain dictionary words.
True
T/F:Cybersecurity threats only come from external hackers.
False
T/F:A VPN helps protect user data when accessing public networks.
True
T/F: A password manager helps store complex passwords securely.
True
T/F:Encrypting sensitive files before storing them adds an extra layer of security.
True
T/F:A brute-force attack involves trying multiple password combinations to gain
access.
True
T/F: Phishing attacks are always easy to recognize.
False
T/F:A computer virus requires human interaction to spread.
True
T/F:Botnets are networks of compromised computers controlled by attackers.
True
T/F: Cybercriminals never use social media for scams.
False
T/F:It is always safe to share personal information on social media.
False
T/F: Cyberbullying can have serious psychological effects.
True
T/F: A trojan disguises itself as legitimate software to trick users into installing it.
True
T/F: A strong security culture in an organization can reduce the risk of cyberattacks.
True
T/F: Cybersecurity professionals do not use penetration testing to identify
vulnerabilities.
False
T/F: Hacktivists attack computer systems for social or political reasons.
True
T/F: A white hat hacker works with organizations to improve security.
True
T/F: Cybercriminals do not target small businesses.
False
T/F: Using different passwords for multiple accounts reduces security risks
True
T/F:Using a social media account login for multiple sites is a good security practice.
False
T/F:Data breaches can lead to identity theft and financial losses.
True
T/F:A good cybersecurity strategy includes regular software updates.
True
T/F:An unprotected network is more vulnerable to cyberattacks
True
T/F:Spam emails may contain malware.
True
T/F:Shoulder surfing is an outdated attack method.
False