DOD CYBER AWARENESS
QUIZ 1-3
COMPLETED EXAM w/
RATIONALES
2024
,1. Which of the following best describes the concept of
"phishing" in the context of cybersecurity?
a) A technique used to gain unauthorized access to a
system through exploiting technological vulnerabilities.
b) A method of spreading malware by using social
engineering techniques via email or messaging.
c) The process of encrypting data to protect it from
unauthorized access.
d) A form of hacking that targets specific individuals or
organizations for financial gain.
Answer: b) A method of spreading malware by using social
engineering techniques via email or messaging.
Rationale: Phishing is a form of cyber attack where the
attacker disguises themselves as a trusted entity to trick
individuals into revealing sensitive information or
spreading malware through deceptive emails or messages.
2. Which of the following best describes the purpose of
multi-factor authentication (MFA)?
a) To ensure data is protected from unauthorized access
during transmission.
b) To verify the identity of users by requiring multiple
forms of authentication.
c) To secure physical access to sensitive areas in an
organization.
d) To encrypt data at rest to prevent unauthorized access.
, Answer: b) To verify the identity of users by requiring
multiple forms of authentication.
Rationale: Multi-factor authentication adds an extra layer
of security by requiring users to provide multiple forms of
verification, such as a password and a unique code sent to
their mobile device, making it more difficult for
unauthorized individuals to gain access to sensitive
information.
3. Which of the following methods is used to ensure the
confidentiality of data during transmission over the
internet?
a) Hashing
b) Encryption
c) Firewall
d) Intrusion Detection System (IDS)
Answer: b) Encryption
Rationale: Encryption is the process of converting data into
a form that can only be deciphered with a specific
decryption key. It ensures that even if data is intercepted
during transmission, it remains unreadable and secure.
4. What is the purpose of regularly patching and updating
software systems?
a) To defend against emerging cyber threats by fixing
known vulnerabilities.
b) To monitor network traffic and detect unauthorized
access attempts.
c) To create a backup of critical data in case of system
QUIZ 1-3
COMPLETED EXAM w/
RATIONALES
2024
,1. Which of the following best describes the concept of
"phishing" in the context of cybersecurity?
a) A technique used to gain unauthorized access to a
system through exploiting technological vulnerabilities.
b) A method of spreading malware by using social
engineering techniques via email or messaging.
c) The process of encrypting data to protect it from
unauthorized access.
d) A form of hacking that targets specific individuals or
organizations for financial gain.
Answer: b) A method of spreading malware by using social
engineering techniques via email or messaging.
Rationale: Phishing is a form of cyber attack where the
attacker disguises themselves as a trusted entity to trick
individuals into revealing sensitive information or
spreading malware through deceptive emails or messages.
2. Which of the following best describes the purpose of
multi-factor authentication (MFA)?
a) To ensure data is protected from unauthorized access
during transmission.
b) To verify the identity of users by requiring multiple
forms of authentication.
c) To secure physical access to sensitive areas in an
organization.
d) To encrypt data at rest to prevent unauthorized access.
, Answer: b) To verify the identity of users by requiring
multiple forms of authentication.
Rationale: Multi-factor authentication adds an extra layer
of security by requiring users to provide multiple forms of
verification, such as a password and a unique code sent to
their mobile device, making it more difficult for
unauthorized individuals to gain access to sensitive
information.
3. Which of the following methods is used to ensure the
confidentiality of data during transmission over the
internet?
a) Hashing
b) Encryption
c) Firewall
d) Intrusion Detection System (IDS)
Answer: b) Encryption
Rationale: Encryption is the process of converting data into
a form that can only be deciphered with a specific
decryption key. It ensures that even if data is intercepted
during transmission, it remains unreadable and secure.
4. What is the purpose of regularly patching and updating
software systems?
a) To defend against emerging cyber threats by fixing
known vulnerabilities.
b) To monitor network traffic and detect unauthorized
access attempts.
c) To create a backup of critical data in case of system