Total Questions : 30
Expected Time : 30 Minutes

1. Which of the following is an example of a common social engineering tactic?

2. What does the term 'Egress Filtering' refer to in network security?

3. Which of the following is a common type of social engineering attack?

4. In the context of network security, what is the role of a Digital Forensic Analyst?

5. What is the primary purpose of encryption in network security?

6. In the context of network security, what does the term 'Endpoint Security' involve?

7. What is the primary purpose of a Proxy Server in network security?

8. What is the purpose of a Security Audit in network security?

9. Which of the following is an example of a cybersecurity vulnerability?

10. What is the primary purpose of antivirus software?

11. Which cybersecurity concept involves creating a replica of a system or network for testing and analysis?

12. Why is it important to use unique passwords for different online accounts?

13. In the context of network security, what is a 'Denial-of-Service (DoS) attack'?

14. What is the primary purpose of a Security Incident Response Plan in network security?

15. What is the purpose of a Security Policy in network security?

16. Which of the following is a common recommendation for securing a home Wi-Fi network?

17. What is the purpose of an antivirus software in network security?

18. What does the term 'Malware' stand for?

19. What is the purpose of Multi-Factor Authentication (MFA) in network security?

20. What is the purpose of a Security Token in two-factor authentication?

21. Which security concept involves the protection of information by converting it into an unreadable format?

22. Which of the following is a common method of protecting against SQL injection attacks?

23. What does VPN stand for in the context of network security?

24. Which authentication method is considered more secure than a simple username and password combination?

25. In network security, what is the purpose of a honeypot?

26. In network security, what does the term 'Ransomware' refer to?

27. Which of the following is an example of a common cybersecurity best practice?

28. What is the primary function of a Virtual LAN (VLAN) in network security?

29. What is the purpose of regular software updates in enhancing network security?

30. In the context of network security, what does the term 'Zero Trust' imply?