Q1
Q1 What is the primary goal of cyber security?
To enhance website aesthetics
To protect systems, networks, and programs from digital attacks
To increase network speed
To advertise services
Q2
Q2 Which of the following is not considered a key objective of cyber security?
Confidentiality
Integrity
Availability
Marketing
Q3
Q3 What does the term "attack surface" in cyber security refer to?
The total number of vulnerabilities
The physical area of the device
A type of cyber attack
The cost of securing a system
Q4
Q4 Which of the following can be classified as a cyber security threat?
Earthquake
Unauthorized access
Server maintenance
Network upgrades
Q5
Q5 Which of the following best describes the principle of least privilege in cyber security?
Users are granted minimal access rights necessary to perform their tasks
Users have complete access to all system resources
Users are allowed temporary access rights
Users are restricted from accessing any resources
Q6
Q6 What does "CIA triad" stand for in cyber security?
Confidentiality, Integrity, Availability
Cyber, Internet, and Authentication
Confidentiality, Integration, and Access
Critical Infrastructure Act
Q7
Q7 Which of the following tools is commonly used to scan a network for vulnerabilities?
Word Processor
Nmap
Photoshop
VLC Player
Q8
Q8 Which command-line tool is used to view active network connections on a Linux system?
ipconfig
netstat
traceroute
ping
Q9
Q9 A user receives an email from an unknown source asking for sensitive information. What is this type of attack called?
Phishing
DoS attack
Man-in-the-middle attack
DDoS attack
Q10
Q10 Which cryptographic technique uses the same key for both encryption and decryption?
Symmetric encryption
Asymmetric encryption
Hashing
Digital signatures
Q11
Q11 Which cryptographic method uses a pair of public and private keys?
Symmetric encryption
Asymmetric encryption
Hashing
Block cipher
Q12
Q12 What is the primary purpose of a digital signature in cryptography?
Ensuring data confidentiality
Verifying the integrity and authenticity of data
Encrypting messages
Compressing data
Q13
Q13 Which of the following is an example of a block cipher algorithm?
RSA
AES
ECC
SHA-256
Q14
Q14 What is the role of hashing in cryptography?
Encrypting data
Providing data integrity
Establishing a secure connection
Decrypting data
Q15
Q15 Which of the following is the primary security risk of using outdated cryptographic algorithms?
Performance degradation
Increased key length
Increased vulnerability to attacks
Difficulty in implementation
Q16
Q16 Which of the following is a common tool used to generate cryptographic keys?
GIMP
OpenSSL
Photoshop
Excel
Q17
Q17 In which programming language would you typically use the cryptographic library PyCryptodome to implement encryption?
C++
Python
Java
PHP
Q18
Q18 A company’s encrypted communication is suddenly decipherable by a third party. What is the most likely cause?
Use of weak encryption algorithm
Compromised private key
Misconfigured firewall
Improper key management
Q19
Q19 Which of the following protocols is primarily used to secure communication over the internet?
HTTP
SMTP
SSL/TLS
FTP
Q20
Q20 What is the main function of the HTTPS protocol?
To increase website speed
To secure data transfer between a user and a website
To compress web pages
To improve SEO
Q21
Q21 Which of the following is a security protocol specifically designed to provide VPN (Virtual Private Network) services?
SSL
IPsec
FTP
SFTP
Q22
Q22 Which protocol is commonly used to secure email communication?
HTTP
IMAP
SMTP
PGP
Q23
Q23 What is the primary difference between SSL and TLS?
SSL is faster than TLS
TLS is an updated version of SSL
SSL is for emails, TLS for websites
They are identical
Q24
Q24 Which version of SSL is known to have severe vulnerabilities and should not be used?
SSLv1
SSLv2
SSLv3
TLSv1.2
Q25
Q25 Which security protocol provides end-to-end encryption in modern web browsers, ensuring the confidentiality of web sessions?
IPsec
SSL
TLS
PGP
Q26
Q26 Which command can be used to generate an SSL certificate using OpenSSL?
openssl generate
openssl certgen
openssl req -new -x509
openssl createcert
Q27
Q27 What is the correct command to verify an SSL certificate using OpenSSL?
openssl verify mycert.pem
openssl sign mycert.pem
openssl check mycert.pem
openssl valid mycert.pem
Q28
Q28 How can you check if a specific website is using HTTPS in a browser's developer tools?
Check the "Headers" tab
Check the "Console" tab
Check the "Network" tab
Check the "Elements" tab
Q29
Q29 A user is receiving warnings that a website’s SSL certificate is expired. What is the immediate solution for the website administrator?
Ignore the warnings
Issue a new SSL certificate
Update the browser
Contact the hosting provider
Q30
Q30 An organization’s VPN connection is dropping frequently during peak hours. What could be the most likely cause?
Outdated encryption protocol
Network congestion
Misconfigured IPsec settings
Firewall blocking VPN traffic