41. Which of the following is an example of a social engineering technique?
A) SQL injection
B) Cross-site scripting
C) Spear phishing
D) Man-in-the-middle attack
42. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the web application software?
A) SQL injection attack
B) Cross-site scripting attack
C) Cross-site request forgery attack
D) All of the above
43. What is the term for the process of backing up important data and storing it in a separate location to protect against data loss or corruption?
A) Disaster recovery
B) Business continuity
C) Redundancy
D) Backups
44. Which type of cybersecurity attack involves hackers gaining access to a system by tricking a legitimate user into providing their login credentials?
A) Phishing attack
B) Man-in-the-middle attack
C) Ransomware attack
D) DDoS attack
45. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the operating system or application software?
A) SQL injection attack
B) Cross-site scripting attack
C) Buffer overflow attack
D) Cross-site request forgery attack
46. Which of the following is an example of a cybersecurity control?
A) Firewall
B) Backup and recovery plan
C) Employee training program
D) All of the above
47. What is the term for the practice of hiding sensitive information by converting it into a code that can only be deciphered with a key?
A) Encryption
B) Firewall
C) IDS
D) Network segmentation
48. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the wireless network?
A) SQL injection attack
B) Cross-site scripting attack
C) Man-in-the-middle attack
D) Rogue access point attack
49. Which of the following is a common tool used for network mapping and discovery?
A) Nessus
B) Wireshark
C) Nmap
D) Snort
50. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the database management system?
A) SQL injection attack
B) Cross-site scripting attack
C) Cross-site request forgery attack
D) Buffer overflow attack