#1. Which of the following is a method for securing a mobile device if it is lost or stolen?
#2. What is the term for a technique used to gain unauthorized access to a system by exploiting human psychology?
#3. Which encryption protocol is commonly used to secure email communication?
#4. What is the purpose of a security policy in an organization?
#5. Which of the following is an example of a strong authentication factor?
#6. What is the term for a program that self-replicates and spreads to other computers or devices over a network?
#7. Which of the following is NOT a common method for protecting against phishing attacks?
#8. What is the term for a security breach that occurs when an attacker gains unauthorized physical access to a computer or network equipment?
#9. Which of the following is NOT a recommended method for securing a Wi-Fi network?
#10. What is the purpose of a security audit?
#11. What is the term for a technique used to verify the authenticity of a message or document?
#12. Which of the following is a common social engineering technique that involves impersonating a trusted entity in order to trick individuals into revealing sensitive information?
#13. What is the primary goal of a security incident response plan?
#14. Which type of attack involves flooding a network or server with excessive traffic to make it unavailable to legitimate users?
#15. What is the term for the practice of gaining unauthorized access to a system by exploiting software vulnerabilities?
#16. Which encryption algorithm is commonly used for securing web traffic (e.g., HTTPS)?
#17. What is the term for the process of masking sensitive information to protect it from unauthorized access?
#18. Which of the following is a type of physical security control used to restrict access to a secure area based on biometric data?
#19. What is the purpose of network segmentation in cybersecurity?
#20. What is the term for a process that verifies the integrity of data by comparing it to a known value or checksum?