71. What is a digital signature?
a. A cryptographic technique that is used to verify the authenticity and integrity of a digital document or message.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
72. What is a firewall?
a. A network security device that monitors and controls incoming and outgoing network traffic.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
73. What is a proxy server?
a. A server that acts as an intermediary between a client and a server, typically used to filter or control access to web content.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
74. What is a honeypot?
a. A decoy system that is designed to lure attackers and gather information about their methods and activities.
b. A type of computer virus.
c. A security feature that prevents unauthorized access to a computer system or network.
d. None of the above.
75. What is steganography?
a. The practice of hiding a message or file within another file, such as an image or audio file, to avoid detection.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
76. What is a keylogger?
a. A type of software that records every keystroke made on a computer, often used for malicious purposes.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
77. What is a rootkit?
a. A type of malware that is designed to hide its presence on a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
78. What is a botnet?
a. A network of compromised computers that are controlled by an attacker to carry out malicious activities.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
79. What is ransomware?
a. A type of malware that encrypts a victim’s data and demands payment in exchange for the decryption key.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
80. Which of the following is a common type of phishing attack?
a. Spear phishing
b. Whale phishing
c. Vishing
d. All of the above