Lompat ke konten Lompat ke sidebar Lompat ke footer

Soal - Soal Cyber Security Bagian 1

 

  • What is the primary goal of cybersecurity?

    • A. To install antivirus software
    • B. To protect information and systems from cyber attacks
    • C. To use strong passwords
    • D. To update software regularly
    • Answer: B
  • Which of the following is considered a type of social engineering attack?

    • A. Phishing
    • B. DDoS attack
    • C. SQL injection
    • D. Man-in-the-middle attack
    • Answer: A
  • What does the acronym "VPN" stand for?

    • A. Virtual Public Network
    • B. Virtual Private Network
    • C. Very Private Network
    • D. Variable Private Network
    • Answer: B
  • Which of these is a common method used by hackers to gain unauthorized access?

    • A. Firewall
    • B. Encryption
    • C. Brute force attack
    • D. Antivirus
    • Answer: C
  • What is the process of converting data into a code to prevent unauthorized access called?

    • A. Decryption
    • B. Encryption
    • C. Authentication
    • D. Firewalling
    • Answer: B
  • What is a "zero-day" vulnerability?

    • A. A known vulnerability that has been patched
    • B. An unknown vulnerability that is being exploited
    • C. A vulnerability that causes no damage
    • D. A vulnerability in hardware only
    • Answer: B
  • What does "DDoS" stand for in the context of cybersecurity?

    • A. Distributed Denial of Service
    • B. Digital Denial of Service
    • C. Direct Denial of Service
    • D. Dynamic Denial of Service
    • Answer: A
  • Which protocol is commonly used to secure email communications?

    • A. HTTP
    • B. SMTP
    • C. SSL/TLS
    • D. FTP
    • Answer: C
  • What is the primary purpose of a firewall in a network?

    • A. To speed up network traffic
    • B. To monitor and filter incoming and outgoing network traffic
    • C. To provide wireless connectivity
    • D. To encrypt data
    • Answer: B
  • What does the term "phishing" refer to in cybersecurity?

    • A. Scanning for open ports
    • B. Sending fraudulent emails to obtain sensitive information
    • C. Creating fake websites
    • D. Infecting systems with malware
    • Answer: B
  • Which of the following is a type of malware that demands payment to restore access to the infected system?

    • A. Virus
    • B. Trojan
    • C. Ransomware
    • D. Spyware
    • Answer: C
  • Which organization is responsible for establishing and maintaining cybersecurity standards for the U.S. federal government?

    • A. FBI
    • B. NSA
    • C. NIST
    • D. DHS
    • Answer: C
  • What is the primary function of an Intrusion Detection System (IDS)?

    • A. To prevent unauthorized access
    • B. To detect and alert on suspicious activities
    • C. To encrypt network traffic
    • D. To provide antivirus protection
    • Answer: B
  • Which of the following is a good practice for creating strong passwords?

    • A. Using easily remembered words
    • B. Using a mix of upper and lower case letters, numbers, and special characters
    • C. Using personal information
    • D. Keeping the same password for all accounts
    • Answer: B
  • What type of attack involves overwhelming a system with traffic to disrupt its normal operations?

    • A. SQL injection
    • B. DDoS attack
    • C. Phishing
    • D. Man-in-the-middle attack
    • Answer: B
  • Which of the following best describes a "man-in-the-middle" attack?

    • A. An attacker intercepts communication between two parties
    • B. An attacker gains physical access to a computer
    • C. An attacker uses malware to take control of a system
    • D. An attacker uses social engineering to gain information
    • Answer: A
  • What is the purpose of two-factor authentication (2FA)?

    • A. To simplify the login process
    • B. To provide an additional layer of security
    • C. To encrypt data
    • D. To scan for viruses
    • Answer: B
  • Which of the following is not a common type of malware?

    • A. Worm
    • B. Botnet
    • C. Firewall
    • D. Rootkit
    • Answer: C
  • What is a "honeypot" in cybersecurity?

    • A. A device that speeds up network traffic
    • B. A decoy system to attract and monitor attackers
    • C. A type of firewall
    • D. A method of encrypting data
    • Answer: B
  • What is the main purpose of encryption in cybersecurity?

    • A. To speed up data transmission
    • B. To protect data confidentiality
    • C. To filter network traffic
    • D. To detect malware
    • Answer: B
  • Which of the following is an example of physical security in cybersecurity?

    • A. Installing antivirus software
    • B. Using firewalls
    • C. Locking server rooms
    • D. Encrypting data
    • Answer: C
  • Which term refers to the unauthorized use of someone else's computer resources for mining cryptocurrency?

    • A. Phishing
    • B. Cryptojacking
    • C. Spoofing
    • D. Keylogging
    • Answer: B
  • What is the primary difference between a virus and a worm?

    • A. A virus can replicate itself, while a worm cannot
    • B. A worm can spread without human interaction, while a virus requires a host
    • C. A virus is a type of malware, while a worm is not
    • D. A worm only affects hardware, while a virus affects software
    • Answer: B
  • What does "CIA" stand for in the context of cybersecurity?

    • A. Central Intelligence Agency
    • B. Confidentiality, Integrity, Availability
    • C. Cybersecurity Information Act
    • D. Computer Information Access
    • Answer: B
  • Which of the following best describes a "Trojan horse" in cybersecurity?

    • A. A self-replicating program that spreads through networks
    • B. A program that appears legitimate but performs malicious activities
    • C. An attack that disrupts network services
    • D. A method of encrypting data
    • Answer: B
  • Rio Widyatmoko
    Rio Widyatmoko Desainer Grafis, Trainer, Developer & Pecandu Teknologi Lulus dengan Jurusan Sistem Informasi, Jangan ragu untuk terhubung dengan saya di Media Sosial Instagram: @widyatmokorio :)

    Posting Komentar untuk "Soal - Soal Cyber Security Bagian 1"