Skip to content
#1. Which of the following is a common method for protecting against SQL injection attacks?
#2. What is the purpose of a security awareness training program for employees?
#3. What is the term for a program that replicates itself and spreads to other computers or devices through removable media?
#4. Which of the following is a recommended practice for securely disposing of paper documents containing sensitive information?
#5. What is the term for a software program that monitors and filters incoming and outgoing network traffic based on an applied rule set?
#6. Which of the following is a method for securing a mobile device if it is lost or stolen?
#7. What is the term for a technique used to gain unauthorized access to a system by exploiting human psychology?
#8. Which encryption protocol is commonly used to secure email communication?
#9. What is the purpose of a security policy in an organization?
#10. Which of the following is an example of a strong authentication factor?
#11. What is the term for a program that self-replicates and spreads to other computers or devices over a network?
#12. Which of the following is NOT a common method for protecting against phishing attacks?
#13. What is the term for a security breach that occurs when an attacker gains unauthorized physical access to a computer or network equipment?
#14. Which of the following is an example of a biometric authentication method?
#15. What is the purpose of a honey pot in cybersecurity?
#16. What is the term for a piece of code that exploits a software vulnerability to carry out an attack?
#17. Which of the following is a best practice for secure disposal of electronic devices?
#18. Which encryption algorithm is commonly used for secure communication on the internet?
#19. What is the term for a program or set of programs that carry out a coordinated attack on a target system or network?
#20. What is the purpose of a firewall in network security?