Skip to content
#1. Which encryption protocol secures data transmitted over wireless networks?
#2. What is the primary goal of an ethical hacker?
#3. What is the term for the practice of tricking individuals into revealing confidential information?
#4. What does the acronym VPN stand for?
#5. Which of the following is an example of a physical security control?
#6. What is the term for a piece of code that exploits a software vulnerability to carry out an attack?
#7. Which of the following is a best practice for secure disposal of electronic devices?
#8. What is the purpose of a honey pot in cybersecurity?
#9. What is the term for a software program that appears to perform a legitimate function but actually carries out malicious activities?
#10. What is the purpose of a security policy in an organization?
#11. Which of the following is an example of a strong authentication factor?
#12. What is the term for a program that self-replicates and spreads to other computers or devices?
#13. Which of the following is NOT a common method for protecting against phishing attacks?
#14. What is the term for the process of converting encrypted data back into its original form?
#15. Which of the following is an example of a network security perimeter device?
#16. What is the term for a security breach that occurs when an attacker gains unauthorized physical access to a computer or network equipment?
#17. Which of the following is an example of a biometric authentication method?
#18. What is the term for the process of examining network traffic for suspicious activity or patterns?
#19. Which encryption algorithm is commonly used for secure communication on the internet?
#20. What is the term for a program or set of programs that carry out a coordinated attack on a target system or network?