Question: Which of the following is primarily used for transferring files between computers over a network?
Answer Choices: FTP
SMTP
IMAP
SNMP
Answer: FTP
Question: Which of the following is an example of a multi-factor authentication combination?
Answer Choices: Username and password
Password and PIN
Smart card and fingerprint
Password and password hint
Answer: Smart card and fingerprint
Question: Which of the following is a technique used by attackers to redirect a website’s traffic to a fraudulent site?
Answer Choices: Phishing
Spoofing
Pharming
Sniffing
Answer: Pharming
Question: Which of the following is the process of converting encrypted data back into its original form?
Answer Choices: Encoding
Decryption
Hashing
Encryption
Answer: Decryption
Question: Which of the following is a protocol used to manage devices on IP networks?
Answer Choices: SMTP
IMAP
SNMP
FTP
Answer: SNMP
Question: Which of the following best describes malware that secretly collects information about a user’s activities without their consent?
Answer Choices: Rootkit
Spyware
Trojan horse
Worm
Answer: Spyware
Question: Which of the following is designed to overload a buffer with data, causing a system crash or enabling arbitrary code execution?
Answer Choices: Buffer overflow
SQL injection
Cross-site scripting
Spoofing
Answer: Buffer overflow
Question: Which of the following best describes cyber forensics?
Answer Choices: Collecting and analyzing digital evidence for legal cases
Writing secure code
Encrypting digital data
Designing secure systems
Answer: Collecting and analyzing digital evidence for legal cases
Question: Which of the following attacks involves sending fraudulent communications that appear to come from a trusted source to steal sensitive information?
Answer Choices: Spoofing
Sniffing
Phishing
Pharming
Answer: Phishing
Question: Which of the following is a security attack where data is altered during transmission without detection?
Answer Choices: Replay attack
Modification attack
Man-in-the-middle attack
Spoofing attack
Answer: Modification attack
Question: Which of the following is a mathematical function that converts data into a fixed-size string of characters, typically used in password security?
Answer Choices: Encryption
Hashing
Decryption
Encoding
Answer: Hashing
Question: Which of the following refers to the practice of disguising malicious IP addresses as legitimate ones?
Answer Choices: Spoofing
Sniffing
Phishing
Spamming
Answer: Spoofing
Question: Which of the following protocols is commonly used to secure websites and encrypt web traffic?
Answer Choices: SSH
SSL/TLS
FTP
SMTP
Answer: SSL/TLS
Question: Which of the following is a program that appears legitimate but performs malicious activities when executed?
Answer Choices: Worm
Trojan horse
Virus
Spyware
Answer: Trojan horse
Question: Which of the following is a type of attack where the attacker resends valid data transmissions maliciously or fraudulently?
Answer Choices: Replay attack
Modification attack
Sniffing attack
Spoofing attack
Answer: Replay attack