Put Question Paper Format
Put Question Paper Format
Put Question Paper Format
1. Question: What does the term "phishing" refer to in the context of cybersecurity?
a) A type of fishing technique
b) A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy
entity
c) A computer virus that spreads through social media
d) A method for securing email communication
Answer: b) A fraudulent attempt to obtain sensitive information by pretending to be a
trustworthy entity
2. Question: What is the primary purpose of digital literacy?
a) Enhancing knowledge of traditional communication methods
b) Promoting online gaming
c) Understanding and effectively using digital technologies
d) Increasing print media consumption
Answer: c) Understanding and effectively using digital technologies
3. Question: How can you strengthen your passwords?
a) Use easily guessable words
b) Include personal information like your name or birthdate
c) Use a combination of uppercase and lowercase letters, numbers, and symbols
d) Share your passwords with trusted friends
Answer: c) Use a combination of uppercase and lowercase letters, numbers, and symbols
4. Question: What is the purpose of a firewall in cybersecurity?
a) Speed up internet connections
b) Prevent unauthorized access to a computer or network
c) Enhance the graphics of a computer
d) Scan for malware in emails
Answer: b) Prevent unauthorized access to a computer or network
5. Question: Which of the following is an example of two-factor authentication?
a) Using a strong password
b) Answering security questions
c) Providing a fingerprint scan and entering a code sent to your phone
d) Sharing login credentials with a colleague
Answer: c) Providing a fingerprint scan and entering a code sent to your phone
6. Question: What is the purpose of regular software updates?
a) Slow down the computer
b) Introduce new bugs and vulnerabilities
c) Enhance security by fixing bugs and vulnerabilities
d) Delete important files
Answer: c) Enhance security by fixing bugs and vulnerabilities
7. Question: What is the role of a Virtual Private Network (VPN)?
a) Increase internet speed
b) Create a secure and encrypted connection over the internet
c) Share personal information with others
d) Block access to certain websites
Answer: b) Create a secure and encrypted connection over the internet
8. Question: What is the definition of social engineering in cybersecurity?
a) Building social networks online
b) Increasing social media followers
c) Manipulating people into divulging confidential information or compromising security
d) Developing new branches of computer science
Answer: c) Manipulating people into divulging confidential information or compromising
security
9. Question: What is malware?
a) Hardware used for gaming
b) Malicious software designed to harm or exploit computers or networks
c) A secure file storage system
d) A computer programming language
Answer: b) Malicious software designed to harm or exploit computers or networks
10. Question: If you receive an unsolicited email with a suspicious link, what should you do?
a) Click on the link to investigate
b) Forward it to all your contacts
c) Delete it and do not click on any links
d) Reply and ask for more information
Answer: c) Delete it and do not click on any links
11. Question: What is the purpose of end-to-end encryption?
a) Increase internet speed
b) Secure communication by encrypting messages from sender to receiver
c) Delete messages after they are read
d) Share messages with third-party services
Answer: b) Secure communication by encrypting messages from sender to receiver
12. Question: What is the best practice for handling unknown USB drives?
a) Plug them into your computer to see what's on them
b) Avoid using them as they may contain malware
c) Share them with colleagues to see if they are useful
d) Use them for extra storage without scanning
Answer: b) Avoid using them as they may contain malware
13. Question: What is a strong indicator that an email might be a phishing attempt?
a) The email contains spelling and grammar errors
b) The email is marked as high importance
c) The email has a generic greeting like "Dear User"
d) The email contains a sense of urgency and asks for personal information
Answer: d) The email contains a sense of urgency and asks for personal information
14. Question: What is the purpose of a CAPTCHA?
a) Enhance the speed of internet browsing
b) Protect against automated bots by requiring users to prove they are human
c) Encrypt emails for secure communication
d) Increase the size of online databases
Answer: b) Protect against automated bots by requiring users to prove they are human
15. Question: What is the significance of a strong authentication process?
a) It slows down access to digital accounts
b) It ensures only one device can access an account
c) It enhances security by verifying the identity of the user
d) It requires multiple passwords for the same account
Answer: c) It enhances security by verifying the identity of the user
16. Question: What is the purpose of a security audit?
a) Increase the number of security vulnerabilities
b) Assess and improve the effectiveness of security measures
c) Share sensitive information with external parties
d) Delete unnecessary security protocols
Answer: b) Assess and improve the effectiveness of security measures
17. Question: What is the first line of defense against malware?
a) Antivirus software
b) Firewall
c) Regular software updates
d) User awareness and cautious behavior
Answer: d) User awareness and cautious behavior
18. Question: What is the role of biometric authentication?
a) Use personal information for login credentials
b) Authenticate users based on physical or behavioral characteristics
c) Share authentication codes through SMS
d) Increase the complexity of passwords
Answer: b) Authenticate users based on physical or behavioral characteristics
19. Question: How can you minimize the risk of identity theft online?
a) Share personal information on social media platforms
b) Use the same password for multiple accounts
c) Be cautious about sharing sensitive information and use strong, unique passwords
d) Respond to unsolicited emails requesting personal information
Answer: c) Be cautious about sharing sensitive information and use strong, unique
passwords
20. Question: What is the purpose of a data backup?
a) Delete unnecessary files
b) Store data on external drives for faster access
c) Ensure data can be recovered in case of loss or corruption
d) Share data with unauthorized parties
Answer: c) Ensure data can be recovered in case of loss or corruption
21. Question: What is the significance of cybersecurity training for employees?
a) Slow down work processes
b) Increase the risk of security breaches
c) Enhance employee awareness and reduce the likelihood of security incidents
d) Focus on individual productivity only
Answer: c) Enhance employee awareness and reduce the likelihood of security incidents
22. Question: How can you identify a secure website?
a) It has a long and complicated URL
b) It displays a padlock icon in the address bar and uses "https://"
c) It allows anonymous browsing
d) It requires the installation of unknown plugins
Answer: b) It displays a padlock icon in the address bar and uses "https://"
23. Question: What is the purpose of an intrusion detection system?
a) Slow down internet connections to detect intrusions
b) Prevent all incoming traffic to a network
c) Monitor and detect unauthorized access or activities in a network
d) Delete files that are considered suspicious
Answer: c) Monitor and detect unauthorized access or activities in a network
24. Question: What is the role of a security token?
a) Increase the speed of internet browsing
b) Provide an additional layer of authentication by generating one-time codes
c) Share login credentials with multiple users
d) Encrypt emails for secure communication
Answer: b) Provide an additional layer of authentication by generating one-time codes
25. Question: What is the purpose of a security policy?
a) Increase the number of security vulnerabilities
b) Establish guidelines and rules to ensure the security of an organization's information assets
c) Delete unnecessary security protocols
d) Share sensitive information with external parties
Answer: b) Establish guidelines and rules to ensure the security of an organization's
information assets
26. Question: How does ransomware typically spread?
a) Through physical media like USB drives
b) By exploiting vulnerabilities in software and systems
c) Only through email attachments
d) By sharing files on social media
Answer: b) By exploiting vulnerabilities in software and systems
27. Question: What is the purpose of a secure socket layer (SSL)?
a) Increase internet speed
b) Encrypt data exchanged between a user's browser and the website
c) Delete cookies stored in a browser
d) Allow unrestricted access to websites
Answer: b) Encrypt data exchanged between a user's browser and the website
28. Question: What is the purpose of a privacy policy on websites?
a) Increase internet speed
b) Specify how user data is collected, used, and protected
c) Delete user accounts
d) Share user data with third-party advertisers
Answer: b) Specify how user data is collected, used, and protected
29. Question: What is the role of encryption in cybersecurity?
a) Slow down internet connections
b) Protect sensitive information by converting it into a coded format
c) Increase the risk of data breaches
d) Delete important files
Answer: b) Protect sensitive information by converting it into a coded format
30. Question: How can you verify the legitimacy of a website's SSL certificate?
a) Check if the website has a long and complicated URL
b) Verify the presence of a padlock icon in the address bar and check the certificate details
c) Share personal information with the website
d) Use public Wi-Fi connections to access the website
Answer: b) Verify the presence of a padlock icon in the address bar and check the certificate
details
31. Question: What is the purpose of a security awareness program?
a) Increase the risk of security incidents
b) Slow down work processes
c) Educate individuals about potential security risks and best practices
d) Delete sensitive information from company databases
Answer: c) Educate individuals about potential security risks and best practices
32. Question: What is the significance of a strong incident response plan?
a) Increase the likelihood of security incidents
b) Slow down the resolution of security breaches
c) Minimize the impact of security incidents and facilitate a timely response
d) Delete records of security incidents
Answer: c) Minimize the impact of security incidents and facilitate a timely response
33. Question: How can you identify a phishing email?
a) It contains a generic greeting like "Dear User"
b) It has a professional appearance and format
c) It comes from a known and trusted source
d) It contains a sense of urgency and requests personal information
Answer: d) It contains a sense of urgency and requests personal information
34. Question: What is the purpose of a security patch?
a) Slow down computer performance
b) Introduce new vulnerabilities to the system
c) Fix security vulnerabilities in software and systems
d) Delete unnecessary files
Answer: c) Fix security vulnerabilities in software and systems
35. Question: How can you secure your Wi-Fi network?
a) Keep the default SSID and password provided by the router manufacturer
b) Disable encryption to allow easy access for guests
c) Use a strong, unique password for the Wi-Fi network and enable WPA or WPA2
encryption
d) Share the Wi-Fi password on social media for convenience
Answer: c) Use a strong, unique password for the Wi-Fi network and enable WPA or WPA2
encryption
36. Question: What is the purpose of a security assessment?
a) Increase the number of security vulnerabilities
b) Evaluate and identify weaknesses in an organization's security posture
c) Delete unnecessary security protocols
d) Share sensitive information with external parties
Answer: b) Evaluate and identify weaknesses in an organization's security posture
37. Question: How does a firewall contribute to network security?
a) Speed up internet connections
b) Monitor and control incoming and outgoing network traffic based on predetermined
security rules
c) Delete unnecessary files from the network
d) Share network resources with unauthorized users
Answer: b) Monitor and control incoming and outgoing network traffic based on
predetermined security rules
38. Question: What is the purpose of a security incident log?
a) Increase the likelihood of security incidents
b) Slow down the resolution of security breaches
c) Document and track security incidents for analysis and improvement
d) Delete records of security incidents
Answer: c) Document and track security incidents for analysis and improvement
39. Question: How can you recognize a potentially malicious email attachment?
a) It comes from a known and trusted source
b) It has a common file extension like .doc or .pdf
c) It contains a sense of urgency and requests personal information
d) It is unexpected, and you weren't anticipating any attachments
Answer: d) It is unexpected, and you weren't anticipating any attachments