Jss3 first term education security past questions and answers
Question: What is the primary purpose of a firewall in computer security?
a) Virus removal
b) Network monitoring
c) Unauthorized access prevention
Answer: c) Unauthorized access prevention
Question: Which type of malware is designed to spread from one computer to another without the user's knowledge?
a) Spyware
b) Worm
c) Trojan
Answer: b) Worm
Question: What is the purpose of encryption in data security?
a) Data compression
b) Data authentication
c) Data confidentiality
Answer: c) Data confidentiality
Question: Which of the following is a common method to create strong passwords?
a) Using birthdays
b) Using dictionary words
c) Combining letters, numbers, and symbols
Answer: c) Combining letters, numbers, and symbols
Question: What is phishing?
a) A fishing technique
b) A method of catching malware
c) A fraudulent attempt to obtain sensitive information
Answer: c) A fraudulent attempt to obtain sensitive information
Question: What does the acronym VPN stand for?
a) Virtual Private Network
b) Very Private Network
c) Visual Private Network
Answer: a) Virtual Private Network
Question: In computer security, what does the term "Biometrics" refer to?
a) Biological weapons
b) Authentication based on unique physical or behavioral attributes
c) Binary metrics
Answer: b) Authentication based on unique physical or behavioral attributes
Question: What is a keylogger?
a) A device for typing faster
b) Software that records keystrokes
c) A hardware component of a computer
Answer: b) Software that records keystrokes
Question: What is a DMZ (Demilitarized Zone) in network security?
a) A dangerous zone on the internet
b) A buffer zone between a private network and the internet
c) A secure zone for confidential data
Answer: b) A buffer zone between a private network and the internet
Question: What is two-factor authentication?
a) Using two different passwords
b) An authentication method using two verification steps
c) Authentication based on biometrics
Answer: b) An authentication method using two verification steps
Question: Which protocol is commonly used to secure communication over the internet?
a) HTTP
b) FTP
c) HTTPS
Answer: c) HTTPS
Question: What is the role of antivirus software?
a) Enhancing computer speed
b) Protecting against malware and viruses
c) Managing computer memory
Answer: b) Protecting against malware and viruses
Question: What is the purpose of a security patch?
a) Enhancing software features
b) Fixing vulnerabilities and improving security
c) Adding new functionalities
Answer: b) Fixing vulnerabilities and improving security
Question: What is the difference between a virus and a trojan?
a) Viruses spread independently, while trojans rely on user actions
b) Trojans are more harmful than viruses
c) Viruses only affect hardware
Answer: a) Viruses spread independently, while trojans rely on user actions
Question: What does the principle of least privilege mean in security?
a) Providing maximum access to all users
b) Granting minimal access required for tasks
c) Giving access based on seniority
Answer: b) Granting minimal access required for tasks
Question: What is a CAPTCHA used for?
a) Encrypting emails
b) Identifying spam
c) Verifying that a user is human
Answer: c) Verifying that a user is human
Question: What is social engineering in the context of security?
a) Improving social skills for better teamwork
b) Manipulating people into divulging confidential information
c) Upgrading social media accounts
Answer: b) Manipulating people into divulging confidential information
Question: Why is it important to keep software up to date for security?
a) To improve the user interface
b) To fix bugs and vulnerabilities
c) To add new features
Answer: b) To fix bugs and vulnerabilities
Question: What is a honeypot in cybersecurity?
a) A trap set to detect, deflect, or study attempts at unauthorized use
b) A device for collecting honey
c) A type of firewall
Answer: a) A trap set to detect, deflect, or study attempts at unauthorized use
Question: What does the acronym DDoS stand for?
a) Distributed Data System
b) Dedicated Denial of Service
c) Dynamic Detection of Security
Answer: b) Dedicated Denial of Service
Post a Comment