Skip to content
#1. What does “Phishing” refer to in the context of cybersecurity?
#2. What is a firewall in the context of network security?
#3. What does VPN stand for in the context of network security?
#4. What is the purpose of encryption in cybersecurity?
#5. What is a common method to enhance password security?
#6. What is a common type of malware that encrypts files and demands a ransom for their release?
#7. What is the term for a software vulnerability that allows attackers to gain unauthorized access to a system?
#8. Which of the following is an example of a strong, secure password?
#9. What does a biometric authentication method rely on for identity verification?
#10. What is the term for a fake website designed to mimic a legitimate one and trick users into entering their login credentials?
#11. Which of the following is NOT a recommended security practice for protecting personal information online?
#12. What is a DDoS attack?
#13. What is a keylogger?
#14. Which protocol is used to secure email communication?
#15. What is the purpose of a security patch?
#16. What is the first line of defense against malware for a computer system?
#17. What does the acronym CIA stand for in cybersecurity?
#18. What is a vulnerability assessment?
#19. Which type of attack involves intercepting communication between two parties without their knowledge?
#20. What is the purpose of a security token?