1) Which of the following is a strong password? a) password123 b) john1980 c) Qw!7$kL9#z  d) 123456 2) Phishing attacks are aimed at: a) Encrypting data b) Physical destruction of servers c) Testing network speed d) Stealing sensitive information by pretending to be a trustworthy source 3) Which of the following is not a type of malware? a) Firewall b) Virus c) Trojan horse d) Worm 4) What does the acronym “CIA” stand for in Information Security? a) Confidentiality, Integrity, Availability b) Cybersecurity, Internet, Access c) Control, Inspection, Authentication d) Confidential, Internet, Algorithm 5) Two-factor authentication (2FA) is used to: a) Speed up system performance b) Add an extra layer of security c) Provide a backup internet connection d) Hide user identity 6) A firewall can prevent unauthorized access to a network. a) True b) False 7) Using the same password for multiple accounts is a good security practice. a) True b) False 8) HTTPS is more secure than HTTP. a) True b) False 9) Social engineering relies on human interaction to breach security. a) True b) False 10) Antivirus software can detect all types of cyber threats. a) True b) False 11) What is the main purpose of encryption in cybersecurity? a) To increase the speed of data transmission b) To compress files for storage c) To protect data from unauthorized access d) To allow open sharing of information 12) Which of the following is an example of a ransomware attack? a) An attacker steals your identity to apply for a loan b) A hacker locks your files and demands payment to unlock them c) An employee shares company secrets accidentally d) Your system slows down due to outdated software 13) What is one of the best ways to protect personal data online? a) Regularly update software and use strong passwords b) Avoid using antivirus software c) Share passwords only with close friends d) Use simple passwords that are easy to remember 14) What does ransomware typically do to a victim’s system? a) Encrypts files and demands a ransom for the decryption key b) Deletes all data permanently c) Monitors the victim's browsing habits d) Slows down the internet connection 15) Why is software patching important in cybersecurity? a) It makes the software look newer b) It adds more user-friendly features c) It reduces the size of the software d) It fixes known vulnerabilities and security issues

quiz on Information Security

Leaderboard

Visual style

Options

Switch template

Continue editing: ?