Cyber Security — Set 1
Technology · साइबर सुरक्षा · Questions 1–10 of 50
What is the primary purpose of a 'Firewall' in network security?
Correct Answer: A. To monitor and filter incoming and outgoing traffic
The correct answer is 'To monitor and filter incoming and outgoing traffic'. A firewall acts as a barrier between a trusted network and an untrusted one. It uses a set of defined security rules to allow or block data packets. Modern firewalls can be either hardware-based or software-based.
In cyber security, what does the abbreviation 'VPN' stand for?
Correct Answer: C. Virtual Private Network
A Virtual Private Network creates an encrypted tunnel for data to travel over the internet. It helps users maintain privacy and bypass geographical restrictions on content. It is widely used by remote workers to access corporate networks securely.
Which type of malware is designed to encrypt a user's files and demand payment for the decryption key?
Correct Answer: D. Ransomware
Ransomware targets critical data to extort money from individuals or organizations. Payments are often demanded in cryptocurrencies like Bitcoin to ensure anonymity. Keeping regular offline backups is the most effective defense against this threat.
What is the term for a deceptive attempt to obtain sensitive information by posing as a trustworthy entity in electronic communication?
Correct Answer: D. Phishing
Phishing usually involves fraudulent emails or websites that mimic legitimate banks or services. Attackers aim to steal login credentials, credit card numbers, or personal identity details. Users should always check the sender's email address and avoid clicking suspicious links.
Which of these refers to the process of converting information into a secret code to prevent unauthorized access?
Correct Answer: C. Encryption
Encryption uses complex mathematical algorithms to transform readable data into ciphertext. Only those with the correct decryption key can revert the code back to its original form. It is a fundamental tool for securing online banking and private messaging.
What is 'Two-Factor Authentication' (2FA)?
Correct Answer: D. A security process requiring two different forms of identification
2FA adds an extra layer of security beyond just a username and password. Common methods include receiving a code via SMS or using a dedicated authenticator app. This significantly reduces the risk of unauthorized account access even if a password is stolen.
Which term describes a network of infected computers controlled remotely by a hacker?
Correct Answer: D. Botnet
A botnet is used to perform large-scale tasks like sending spam or launching DDoS attacks. Each infected device in the network is known as a 'zombie' computer. Users often remain unaware that their devices have been compromised and are part of a botnet.
What does a 'DDoS' attack stand for?
Correct Answer: C. Distributed Denial of Service
A DDoS attack attempts to make a website or online service unavailable by overwhelming it with traffic. This traffic originates from many different sources, making it difficult to stop. Such attacks can cause significant financial and reputational damage to businesses.
What is a 'Zero-Day' vulnerability?
Correct Answer: D. A flaw that is unknown to the software creator and has no patch
Zero-day refers to the fact that developers have had 'zero days' to fix the flaw before it can be exploited. These vulnerabilities are highly prized by hackers and state-sponsored groups. Timely software updates are essential once a patch is eventually released.
In the context of AI and security, what is a 'Deepfake'?
Correct Answer: A. Media where a person's likeness is replaced using artificial intelligence
Deepfakes use machine learning techniques to create realistic but fake videos or audio recordings. They can be used for misinformation, fraud, or damaging a person's reputation. Detection tools are currently being developed to identify these AI-generated forgeries.