1.
What term describes harmful software?
Correct Answer
A. Malware
Explanation
Malware is a broad term that encompasses various forms of harmful software designed to infiltrate, damage, or disable computers, systems, and networks. It includes viruses, worms, Trojan horses, ransomware, and spyware. Malware can steal, encrypt, or delete sensitive data, alter or hijack core computing functions, and spy on users' computer activity without their permission. Understanding malware is crucial because it helps individuals and organizations take appropriate preventive measures, such as installing antivirus software and following safe browsing practices, thereby reducing the risk of security breaches and data loss.
2.
Which feature secures a Wi-Fi network?
Correct Answer
B. Password
Explanation
Securing a Wi-Fi network with a strong password is essential to prevent unauthorized access. A robust password prevents outsiders from connecting to the network and accessing the internet, which can be exploited for malicious activities like hacking and data theft. Password-protected networks are also less likely to be used for illegal downloads or attacks on other networks, reducing legal risks. By encrypting the information sent over the network, a password also ensures that sensitive data remains confidential, providing a basic but powerful layer of security against cyber threats.
3.
What is phishing?
Correct Answer
B. Email scam
Explanation
Phishing is a type of cyber attack that involves tricking individuals into providing sensitive information by masquerading as a legitimate entity, typically through email. This tactic is often used to acquire passwords, credit card details, and other personal information. Phishing emails usually contain links that redirect users to a fake website where they are prompted to enter personal information. Understanding phishing is critical because recognizing such emails can prevent financial loss and identity theft, highlighting the importance of scrutinizing emails, especially those requesting sensitive information.
4.
Where do you often find spyware?
Correct Answer
A. Downloads
Explanation
Spyware is a type of malware that covertly collects information about a person or organization without their knowledge. It often infiltrates systems through deceptive downloads, such as freeware, infected email attachments, or compromised websites. Once installed, spyware monitors user activity, collects keystrokes, accesses confidential information, and can transmit data to third parties. Awareness of spyware sources is vital for avoiding unauthorized surveillance and protecting privacy. Ensuring that downloads are from reputable sources and maintaining updated anti-malware software are practical steps to mitigate the risk of spyware infections.
5.
What does a VPN protect?
Correct Answer
A. Identity
Explanation
A Virtual Private Network (VPN) protects a user's identity and privacy by creating a secure and encrypted connection over a less secure network, such as the internet. The VPN hides the user's IP address, making their online actions virtually untraceable. More importantly, it secures data transmission to prevent unauthorized individuals from eavesdropping on internet traffic and capturing sensitive information like passwords and financial data. This is especially critical when using public Wi-Fi networks, as they are particularly vulnerable to security breaches.
6.
Which action best enhances password security?
Correct Answer
A. Longer length
Explanation
Enhancing password security through longer lengths is an effective strategy against brute-force attacks, where hackers use software tools to guess passwords. A longer password exponentially increases the number of possible combinations, making it much more difficult for attackers to crack. Passwords that combine letters, numbers, and special characters in greater lengths are less likely to be guessed or broken by automated tools, providing stronger security against unauthorized access to personal and corporate accounts.
7.
What device is most vulnerable to hacks?
Correct Answer
A. Unpatched systems
Explanation
Unpatched systems, or devices that have not been updated with the latest security patches, are highly vulnerable to hacks. Hackers exploit known vulnerabilities in software that patches would typically fix. Keeping systems unpatched allows attackers easy access to exploit these vulnerabilities, leading to unauthorized access, data breaches, and potentially severe consequences for data integrity and security. Regular updates and patches are critical defenses against the exploitation of outdated software vulnerabilities.
8.
What process verifies user identity?
Correct Answer
B. Authentication
Explanation
Authentication is a security process that verifies the identities of users trying to gain access to computer systems, networks, or online accounts. It ensures that individuals are who they claim to be by requiring credentials, such as passwords, biometric data, or security tokens. Effective authentication minimizes the risk of unauthorized access, thereby protecting sensitive data from being compromised. It forms the basis of security protocols for countless systems, highlighting its fundamental role in maintaining secure access and preventing identity theft.
9.
Which type of attack floods servers with traffic?
Correct Answer
C. DDoS
Explanation
Distributed Denial of Service (DDoS) attacks aim to disrupt normal web traffic and take targeted websites offline by overwhelming the servers with a flood of internet traffic. These attacks are executed using multiple compromised computer systems as sources of attack traffic. Recognizing and understanding DDoS attacks is essential for businesses and organizations to implement effective mitigation strategies, such as deploying specialized firewalls and anti-DDoS solutions. These preventative measures help maintain service availability and protect against substantial financial and reputational damage.
10.
What should you avoid clicking in unknown emails?
Correct Answer
A. Links
Explanation
In unknown emails, clickable links can be dangerous as they are often used in phishing attacks to direct users to malicious websites. These websites can install malware, steal personal information, or even hijack the entire system. Being cautious about not clicking links in unsolicited emails is a fundamental internet safety practice. It prevents potential exposure to cyber threats and protects users from malware infections and data theft, emphasizing the need for vigilance in email security practices.