Cybersecurity Screening TestBy mfh.officials@gmail.com / January 7, 2025 Cybersecurity Screening Test 1 / 20 What is the role of a Security Information and Event Management (SIEM) system? To analyze security alerts in real-time To perform data encryption To patch software vulnerabilities To provide antivirus solutions 2 / 20 Which hashing algorithm is considered obsolete due to vulnerabilities? SHA-256 MDS SHA-1 AES 3 / 20 What does "phishing" aim to achieve? To install malware To monitor network traffic To overload a server To gain unauthorized access to sensitive information 4 / 20 Which of the following is NOT a common method of securing a wireless network? Hiding the SSID Disabling antivirus software Using a strong password Using WPA2 encryption 5 / 20 Which encryption method uses the same key for encryption and decryption? Asymmetric encryption Symmetric encryption Public Key Infrastructure Hashing 6 / 20 Which of the following is a social engineering attack? Â Phishing Brute Force DDoS SQL Injection 7 / 20 What does the CIA triad stand for in cybersecurity? Confidentiality, Information, Accessibility Confidentiality, Integrity, Availability Cybersecurity, Integrity, Access Confidentiality, Integrity, Authentication 8 / 20 What is the primary purpose of penetration testing? To install firewalls To identify vulnerabilities To perform backups To test system functionality 9 / 20 What is the primary purpose of a Digital Certificate? To encrypt files To store user passwords To monitor network traffic To authenticate identities 10 / 20 What does XSS stand for in cybersecurity? External System Security Cross-Site Scripting XML Secure Sockets Extra Secure Socket 11 / 20 Which protocol is commonly used to secure data in transit? FTP TELNET SSH HTTP 12 / 20 What does the term "sandboxing" mean in cybersecurity? Deploying security patches Isolating untrusted code for testing Blocking unauthorized websites Encrypting sensitive data 13 / 20 Which of the following is NOT a common type of malware? Virus Worm Firewall Trojan Horse 14 / 20 What is the function of a Virtual Private Network (VPN)? To increase internet speed To detect malware To encrypt emails To provide secure remote access 15 / 20 What is the purpose of multi-factor authentication (MFA)? To encrypt passwords To improve user experience To provide an additional layer of security To automate login processes 16 / 20 What does SSL stand for? Secure Server Link Secure System Layer Security System Logic Secure Sockets Layer 17 / 20 What does the term "zero-day vulnerability" refer to? A hardware issue An outdated software flaw A vulnerability patched immediately A vulnerability exploited the same day it is discovered 18 / 20 Which type of attack involves intercepting and altering communication between two parties? Ransomware Man-in-the-Middle (MITM) Phishing Denial of Service (DoS) 19 / 20 What is the function of a DDoS attack? To infiltrate systems silently To steal sensitive data To gain administrative privileges To make a system unavailable by overwhelming it with traffic 20 / 20 What is the primary purpose of a firewall? a) To detect and remove viruses c) To encrypt sensitive data d) To scan for vulnerabilities b) To monitor incoming and outgoing network traffic Your score isThe average score is 65% 0% Restart quiz