Soal - Soal Cyber Security Bagian 1
What is the primary goal of cybersecurity?
- A. To install antivirus software
- B. To protect information and systems from cyber attacks
- C. To use strong passwords
- D. To update software regularly
- Answer: B
Which of the following is considered a type of social engineering attack?
- A. Phishing
- B. DDoS attack
- C. SQL injection
- D. Man-in-the-middle attack
- Answer: A
What does the acronym "VPN" stand for?
- A. Virtual Public Network
- B. Virtual Private Network
- C. Very Private Network
- D. Variable Private Network
- Answer: B
Which of these is a common method used by hackers to gain unauthorized access?
- A. Firewall
- B. Encryption
- C. Brute force attack
- D. Antivirus
- Answer: C
What is the process of converting data into a code to prevent unauthorized access called?
- A. Decryption
- B. Encryption
- C. Authentication
- D. Firewalling
- Answer: B
What is a "zero-day" vulnerability?
- A. A known vulnerability that has been patched
- B. An unknown vulnerability that is being exploited
- C. A vulnerability that causes no damage
- D. A vulnerability in hardware only
- Answer: B
What does "DDoS" stand for in the context of cybersecurity?
- A. Distributed Denial of Service
- B. Digital Denial of Service
- C. Direct Denial of Service
- D. Dynamic Denial of Service
- Answer: A
Which protocol is commonly used to secure email communications?
- A. HTTP
- B. SMTP
- C. SSL/TLS
- D. FTP
- Answer: C
What is the primary purpose of a firewall in a network?
- A. To speed up network traffic
- B. To monitor and filter incoming and outgoing network traffic
- C. To provide wireless connectivity
- D. To encrypt data
- Answer: B
What does the term "phishing" refer to in cybersecurity?
- A. Scanning for open ports
- B. Sending fraudulent emails to obtain sensitive information
- C. Creating fake websites
- D. Infecting systems with malware
- Answer: B
Which of the following is a type of malware that demands payment to restore access to the infected system?
- A. Virus
- B. Trojan
- C. Ransomware
- D. Spyware
- Answer: C
Which organization is responsible for establishing and maintaining cybersecurity standards for the U.S. federal government?
- A. FBI
- B. NSA
- C. NIST
- D. DHS
- Answer: C
What is the primary function of an Intrusion Detection System (IDS)?
- A. To prevent unauthorized access
- B. To detect and alert on suspicious activities
- C. To encrypt network traffic
- D. To provide antivirus protection
- Answer: B
Which of the following is a good practice for creating strong passwords?
- A. Using easily remembered words
- B. Using a mix of upper and lower case letters, numbers, and special characters
- C. Using personal information
- D. Keeping the same password for all accounts
- Answer: B
What type of attack involves overwhelming a system with traffic to disrupt its normal operations?
- A. SQL injection
- B. DDoS attack
- C. Phishing
- D. Man-in-the-middle attack
- Answer: B
Which of the following best describes a "man-in-the-middle" attack?
- A. An attacker intercepts communication between two parties
- B. An attacker gains physical access to a computer
- C. An attacker uses malware to take control of a system
- D. An attacker uses social engineering to gain information
- Answer: A
What is the purpose of two-factor authentication (2FA)?
- A. To simplify the login process
- B. To provide an additional layer of security
- C. To encrypt data
- D. To scan for viruses
- Answer: B
Which of the following is not a common type of malware?
- A. Worm
- B. Botnet
- C. Firewall
- D. Rootkit
- Answer: C
What is a "honeypot" in cybersecurity?
- A. A device that speeds up network traffic
- B. A decoy system to attract and monitor attackers
- C. A type of firewall
- D. A method of encrypting data
- Answer: B
What is the main purpose of encryption in cybersecurity?
- A. To speed up data transmission
- B. To protect data confidentiality
- C. To filter network traffic
- D. To detect malware
- Answer: B
Which of the following is an example of physical security in cybersecurity?
- A. Installing antivirus software
- B. Using firewalls
- C. Locking server rooms
- D. Encrypting data
- Answer: C
Which term refers to the unauthorized use of someone else's computer resources for mining cryptocurrency?
- A. Phishing
- B. Cryptojacking
- C. Spoofing
- D. Keylogging
- Answer: B
What is the primary difference between a virus and a worm?
- A. A virus can replicate itself, while a worm cannot
- B. A worm can spread without human interaction, while a virus requires a host
- C. A virus is a type of malware, while a worm is not
- D. A worm only affects hardware, while a virus affects software
- Answer: B
What does "CIA" stand for in the context of cybersecurity?
- A. Central Intelligence Agency
- B. Confidentiality, Integrity, Availability
- C. Cybersecurity Information Act
- D. Computer Information Access
- Answer: B
Which of the following best describes a "Trojan horse" in cybersecurity?
- A. A self-replicating program that spreads through networks
- B. A program that appears legitimate but performs malicious activities
- C. An attack that disrupts network services
- D. A method of encrypting data
- Answer: B
Posting Komentar untuk "Soal - Soal Cyber Security Bagian 1"