along with their answers:
1. Which of the following is NOT a common type of cyber attack?
a) Phishing
b) Malware
c) Spoofing
d) DDoS
Answer: c) Spoofing
2. What does "IoT" stand for in the context of cybersecurity?
a) Internet of Things
b) Input/Output Terminology
c) Information on Terrorism
d) International Online Threats
Answer: a) Internet of Things
3. What is a firewall used for in cybersecurity?
a) Preventing physical intrusion
b) Protecting against viruses
c) Filtering network traffic
d) Encrypting data
Answer: c) Filtering network traffic
4. What is the purpose of encryption in cybersecurity?
a) Preventing unauthorized access to data
b) Increasing internet speed
c) Enhancing user experience
d) Blocking spam emails
Answer: a) Preventing unauthorized access to data
, b) Gaining administrator access
c) Disrupting services by overwhelming a system
d) Phishing for personal information
Answer: c) Disrupting services by overwhelming a system
6. What is "phishing" in the context of cybersecurity?
a) A type of malware
b) A physical intrusion technique
c) Sending fraudulent emails to deceive individuals
d) A type of encryption
Answer: c) Sending fraudulent emails to deceive individuals
7. Which of the following is an example of two-factor authentication
(2FA)?
a) Using a strong password
b) Answering a security question
c) Scanning a fingerprint and entering a PIN
d) Using a firewall
Answer: c) Scanning a fingerprint and entering a PIN
8. What is the purpose of a penetration test (pen test)?
a) Developing new cybersecurity software
b) Identifying vulnerabilities in a system
c) Creating strong passwords
d) Blocking malicious websites
Answer: b) Identifying vulnerabilities in a system