Cybersecurity Screening TestBy mfh.officials@gmail.com / January 7, 2025 Cybersecurity Screening Test 1 / 20 What does SSL stand for? Security System Logic Secure Server Link Secure Sockets Layer Secure System Layer 2 / 20 What does "phishing" aim to achieve? To overload a server To gain unauthorized access to sensitive information To install malware To monitor network traffic 3 / 20 What is the primary purpose of a Digital Certificate? To authenticate identities To store user passwords To encrypt files To monitor network traffic 4 / 20 Which of the following is a social engineering attack? Â Phishing DDoS Brute Force SQL Injection 5 / 20 Which encryption method uses the same key for encryption and decryption? Public Key Infrastructure Asymmetric encryption Hashing Symmetric encryption 6 / 20 What is the primary purpose of a firewall? c) To encrypt sensitive data b) To monitor incoming and outgoing network traffic d) To scan for vulnerabilities a) To detect and remove viruses 7 / 20 What does the term "sandboxing" mean in cybersecurity? Encrypting sensitive data Isolating untrusted code for testing Deploying security patches Blocking unauthorized websites 8 / 20 Which of the following is NOT a common method of securing a wireless network? Hiding the SSID Using WPA2 encryption Using a strong password Disabling antivirus software 9 / 20 What is the purpose of multi-factor authentication (MFA)? To encrypt passwords To automate login processes To provide an additional layer of security To improve user experience 10 / 20 What is the function of a DDoS attack? To gain administrative privileges To infiltrate systems silently To make a system unavailable by overwhelming it with traffic To steal sensitive data 11 / 20 What is the role of a Security Information and Event Management (SIEM) system? To analyze security alerts in real-time To patch software vulnerabilities To provide antivirus solutions To perform data encryption 12 / 20 What does XSS stand for in cybersecurity? Cross-Site Scripting XML Secure Sockets Extra Secure Socket External System Security 13 / 20 What is the function of a Virtual Private Network (VPN)? To increase internet speed To provide secure remote access To encrypt emails To detect malware 14 / 20 What is the primary purpose of penetration testing? To test system functionality To install firewalls To identify vulnerabilities To perform backups 15 / 20 Which hashing algorithm is considered obsolete due to vulnerabilities? AES SHA-1 SHA-256 MDS 16 / 20 What does the term "zero-day vulnerability" refer to? A vulnerability patched immediately An outdated software flaw A hardware issue A vulnerability exploited the same day it is discovered 17 / 20 Which protocol is commonly used to secure data in transit? TELNET FTP SSH HTTP 18 / 20 Which of the following is NOT a common type of malware? Firewall Worm Trojan Horse Virus 19 / 20 What does the CIA triad stand for in cybersecurity? Confidentiality, Integrity, Authentication Cybersecurity, Integrity, Access Confidentiality, Information, Accessibility Confidentiality, Integrity, Availability 20 / 20 Which type of attack involves intercepting and altering communication between two parties? Denial of Service (DoS) Man-in-the-Middle (MITM) Phishing Ransomware Your score isThe average score is 65% 0% Restart quiz