Which protocol is used to securely browse websites?
A. HTTP
B. FTP
C. HTTPS
D. SMTP
C. HTTPS
A cyber-attack that floods a server with traffic is called:
A. DDoS
B. Phishing
C. SQL Injection
D. Spoofing
Answer: A. DDoS
Method of verifying identity using password or biometrics.
Answer: Authentication
Which cipher shifts letters by a fixed number?
A. Vigenère
B. Caesar Cipher
C. RSA
D. DES
Answer: B. Caesar Cipher
Which application is used for word processing?
A. Excel
B. PowerPoint
C. Word
D. Access
Answer: C. Word
_____ is the protocol used for secure remote login over a network.
Answer: SSH
Answer: SSH
Attack where an email tricks you into giving personal data.
Answer: Phishing
Which is NOT a type of authentication factor?
A. Something you know
B. Something you have
C. Something you are
D. Something you imagine
Answer: D. Something you imagine
RSA is an example of _______ key cryptography.
Answer: Public-key / Asymmetric
Software used for browsing the internet.
Answer: Browser
Which protocol secures email communication?
Answer: TLS / SSL
A malware that encrypts files and demands money is known as _______.
Answer: Ransomware
The process of converting data into unreadable form for protection is called _______.
Answer: Encryption
The Vigenère cipher uses a _______ to encrypt messages.
Answer: Key / Keyword
A program that manages computer hardware is called an _______.
Answer: Operating System
Which protocol is used to establish secure VPN tunnels?
A. IPsec
B. POP3
C. SNMP
D. RDP
Answer: A. IPsec
Which attack involves injecting malicious commands into a database query?
A. MITM
B. SQL Injection
C. Sniffing
D. Backdoor
Answer: B. SQL Injection
Which security method ensures data has not been altered?
A. Integrity
B. Availability
C. Authentication
D. Tracking
Answer: A. Integrity
Which of the following is a symmetric encryption algorithm?
A. RSA
B. ECC
C. AES
D. Diffie-Hellman
Answer: C. AES
Which of these is an example of cloud storage?
A. BIOS
B. Dropbox
C. SSH
D. SQL
Answer: B. Dropbox
Name the protocol that encrypts Wi-Fi traffic in modern networks.
Answer: WPA3
Name the attack where an attacker secretly alters communication between two parties.
Answer: Man-in-the-Middle (MITM)
What is the method of dividing a network into multiple segments for security?
Answer: Network Segmentation
Name the cipher method that encrypts one bit or byte at a time.
Answer: Stream Cipher
What do we call software that allows users to run virtual machines?
Answer: Hypervisor / Virtualization Software