21. What is data encryption standard (DES)?
a. A symmetric-key algorithm used for encrypting data.
b. An asymmetric-key algorithm used for encrypting data.
c. A type of firewall.
d. None of the above.
22. What is advanced encryption standard (AES)?
a. A symmetric-key algorithm used for encrypting data.
b. An asymmetric-key algorithm used for encrypting data.
c. A type of firewall.
d. None
23. What is a firewall?
a. A security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
24. What is a denial-of-service (DoS) attack?
a. An attack in which an attacker floods a system or network with traffic in order to overwhelm it and make it unavailable to users.
b. An attack in which an attacker physically steals data from a computer system.
c. An attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.
25. What is a distributed denial-of-service (DDoS) attack?
a. An attack in which an attacker uses multiple computers to flood a system or network with traffic in order to overwhelm it and make it unavailable to users.
b. An attack in which an attacker physically steals data from a computer system.
c. An attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.
26. What is a honeypot?
a. A computer system or network that is designed to be a decoy or trap for attackers.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
27. What is a rootkit?
a. A type of malware that allows an attacker to gain unauthorized access to a computer system or network and remain undetected.
b. A type of hardware used for virtualization.
c. A type of software used for virtualization.
d. None of the above.
28. What is a Trojan horse?
a. A type of malware that appears to be a legitimate program but actually contains malicious code.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
29. What is a virus?
a. A type of malware that can replicate itself and spread from computer to computer.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
30. What is a worm?
a. A type of malware that can replicate itself and spread from computer to computer without human intervention.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.