#1. What is a common method for protecting sensitive information on a mobile device?
#2. What does the acronym IDS stand for in the context of cybersecurity?
#3. What is the term for a program that appears to be useful or legitimate, but actually carries out malicious activities in the background?
#4. Which of the following is NOT a recommended method for securing a Wi-Fi network?
#5. What is the purpose of a security audit?
#6. What is the term for a technique used to verify the authenticity of a message or document?
#7. Which of the following is a common social engineering technique that involves impersonating a trusted entity in order to trick individuals into revealing sensitive information?
#8. What is the primary goal of a security incident response plan?
#9. Which type of attack involves flooding a network or server with excessive traffic to make it unavailable to legitimate users?
#10. What is the term for the practice of gaining unauthorized access to a system by exploiting software vulnerabilities?
#11. Which encryption algorithm is commonly used for securing web traffic (e.g., HTTPS)?
#12. What is the term for the process of masking sensitive information to protect it from unauthorized access?
#13. Which of the following is a type of physical security control used to restrict access to a secure area based on biometric data?
#14. What is the purpose of network segmentation in cybersecurity?
#15. What is the term for a process that verifies the integrity of data by comparing it to a known value or checksum?
#16. Which of the following is a common method for protecting against SQL injection attacks?
#17. What is the purpose of a security awareness training program for employees?
#18. What is the term for a program that replicates itself and spreads to other computers or devices through removable media?
#19. Which of the following is a recommended practice for securely disposing of paper documents containing sensitive information?
#20. What is the term for a software program that monitors and filters incoming and outgoing network traffic based on an applied rule set?