11. What is a keylogger?
a. A type of malware that records every keystroke made by a user in order to steal sensitive information such as passwords.
b. A type of computer software that helps improve performance.
c. A type of computer peripheral device.
d. A type of computer hardware
12. What is a ransomware attack?
a. A type of attack in which an attacker encrypts a victim’s data and demands payment in exchange for the decryption key.
b. A type of attack in which an attacker physically steals data from a computer system.
c. A type of attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.
13. What is two-factor authentication?
a. A security process in which a user is required to provide two different types of identification in order to access a system or application.
b. A security process in which a user is only required to provide one type of identification in order to access a system or application.
c. A security process in which a user is required to provide three different types of identification in order to access a system or application.
d. None of the above.
14. What is a virtual private network (VPN)?
a. A network that allows users to securely connect to a private network over the internet.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
15. What is a patch?
a. A software update that fixes security vulnerabilities or other issues.
b. A type of computer hardware.
c. A type of computer peripheral device.
d. A type of computer software that helps improve performance.
16. What is a vulnerability?
a. A weakness in a computer system or application that can be exploited by attackers.
b. A strength in a computer system or application that can be exploited by attackers.
c. A feature in a computer system or application that makes it more difficult to attack.
d. None of the above.
17. What is a security audit?
a. A systematic evaluation of a computer system or application to identify security weaknesses and recommend solutions.
b. A process of designing and developing software for computers.
c. A process of making computers faster.
d. None of the above.
18. What is the difference between a vulnerability assessment and a penetration test?
a. A vulnerability assessment identifies security weaknesses, while a penetration test attempts to exploit those weaknesses to gain access to the system or application.
b. A vulnerability assessment attempts to exploit security weaknesses, while a penetration test identifies those weaknesses.
c. A vulnerability assessment and a penetration test are the same thing.
d. None of the above.
19. What is a security policy?
a. A set of rules and guidelines that dictate how an organization will protect its computer systems and data.
b. A process of designing and developing software for computers.
c. A process of making computers faster.
d. None of the above.
20. What is social engineering?
a. A type of attack in which an attacker uses psychological manipulation to trick people into giving away sensitive information or performing an action that compromises security.
b. A type of attack in which an attacker physically breaks into a building in order to steal data.
c. A type of attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.