11. What is the term for software that is designed to damage, disrupt, or take control of a computer system?
A) Firewall
B) Malware
C) Spyware
D) Adware
12. Which type of cybersecurity attack involves hackers encrypting a victim’s data and demanding payment for the decryption key?
A) Trojan horse attack
B) Ransomware attack
C) Phishing attack
D) Man-in-the-middle attack
13. Which type of cybersecurity attack involves hackers flooding a network with traffic in order to overwhelm and shut it down?
A) DDoS attack
B) SQL injection attack
C) Advanced persistent threat
D) Zero-day attack
14. Which of the following is NOT an example of a cybersecurity risk?
A) Unpatched software vulnerabilities
B) Weak passwords
C) Natural disasters
D) Social engineering attacks
15. Which type of cybersecurity attack involves hackers using email or messaging platforms to send malicious links or attachments to victims?
A) Ransomware attack
B) Spear phishing attack
C) Advanced persistent threat
D) Zero-day attack
16. Which of the following is a cybersecurity framework developed by the National Institute of Standards and Technology (NIST)?
A) CIS Controls
B) ISO 27001
C) COBIT
D) NIST Cybersecurity Framework
17. Which of the following is NOT an example of a firewall?
A) Network firewall
B) Host-based firewall
C) Antivirus software
D) Web application firewall
18. What is the term for the process of hiding information within another file, such as an image or audio file?
A) Encryption
B) Hashing
C) Steganography
D) Decryption
19. Which type of cybersecurity attack involves hackers exploiting a vulnerability in a web application to access data or take control of the system?
A) SQL injection attack
B) DDoS attack
C) Man-in-the-middle attack
D) Ransomware attack
20. What is the term for the process of detecting, analyzing, and responding to cybersecurity incidents?
A) Incident response
B) Vulnerability management
C) Risk assessment
D) Threat intelligence