Cyber Security — Set 2
Technology · साइबर सुरक्षा · Questions 11–20 of 50
Which of the following is a type of malware that self-replicates and spreads across networks without human intervention?
Correct Answer: C. Worm
Unlike a virus, a worm does not need to attach itself to an existing program to spread. It exploits security holes in operating systems to move from one computer to another automatically. Famous examples like 'Conficker' have infected millions of computers worldwide.
What is the primary role of a 'Security Operations Center' (SOC)?
Correct Answer: D. To monitor, detect, and respond to cyber threats in real-time
The correct answer is 'To monitor, detect, and respond to cyber threats in real-time'. A SOC is a centralized unit that deals with security issues on an organizational and technical level. It utilizes various tools to analyze logs and identify suspicious patterns of behavior. This proactive approach helps in minimizing the impact of security breaches.
Which term refers to the practice of tricking people into giving up confidential information by exploiting human psychology?
Correct Answer: A. Social Engineering
Social engineering focuses on the 'human element' of security rather than technical exploits. Examples include impersonating a technical support officer or a high-ranking executive. It is often considered the weakest link in the security chain of any organization.
What does the 'S' in 'HTTPS' stand for?
Correct Answer: C. Secure
The correct answer is 'Secure'. HTTPS indicates that the communication between your browser and the website is encrypted using SSL/TLS. It prevents hackers from eavesdropping on sensitive data like passwords or credit card info. Users should always check for the 'padlock' icon in the address bar.
What is 'Biometric' authentication?
Correct Answer: D. Identifying a person based on unique biological traits
Biometrics include fingerprint scanning, facial recognition, and iris patterns for identity verification. These traits are extremely difficult to forge or lose compared to traditional passwords. Many modern smartphones use this technology as a primary security feature.
Which type of hacker uses their skills for ethical purposes, such as finding and fixing security flaws?
Correct Answer: A. White Hat
White Hat hackers are often employed as security consultants or 'penetration testers'. They operate with legal permission and aim to strengthen defenses rather than cause harm. This practice is essential for building robust and secure software systems.
What is the primary function of an 'Intrusion Detection System' (IDS)?
Correct Answer: C. To monitor network traffic for suspicious activity and alerts
An IDS analyzes network traffic patterns to identify signatures of known attacks or anomalies. It functions similarly to a burglar alarm for a computer network. While it detects threats, it usually does not take active steps to stop them.
Which term refers to the art of hiding a message within another non-secret file, like an image?
Correct Answer: D. Steganography
Steganography focuses on hiding the very existence of a message rather than just making it unreadable. A common method involves modifying the least significant bits of an image or audio file. It is used by both security professionals and malicious actors for covert communication.
What is a 'Cloud Access Security Broker' (CASB)?
Correct Answer: A. Software that sits between users and cloud applications to enforce security
CASB tools help organizations manage security and compliance across multiple cloud services. They provide visibility into who is accessing data and block unauthorized activities. As businesses move to the cloud, CASBs have become a vital part of the security architecture.
Which term describes a deceptive computer system designed to lure and trap hackers?
Correct Answer: C. Honeypot
A honeypot appears to contain valuable data but is actually a monitored trap. Security researchers use them to study the methods and tools used by attackers. This information is then used to improve the security of the actual production network.