Question: Which of the following is primarily used for transferring files between computers over a network?

Answer Choices: FTP

SMTP

IMAP

SNMP

Answer: FTP

Question: Which of the following is an example of a multi-factor authentication combination?

Answer Choices: Username and password

Password and PIN

Smart card and fingerprint

Password and password hint

Answer: Smart card and fingerprint

Question: Which of the following is a technique used by attackers to redirect a website’s traffic to a fraudulent site?

Answer Choices: Phishing

Spoofing

Pharming

Sniffing

Answer: Pharming

Question: Which of the following is the process of converting encrypted data back into its original form?

Answer Choices: Encoding

Decryption

Hashing

Encryption

Answer: Decryption

Question: Which of the following is a protocol used to manage devices on IP networks?

Answer Choices: SMTP

IMAP

SNMP

FTP

Answer: SNMP

Question: Which of the following best describes malware that secretly collects information about a user’s activities without their consent?

Answer Choices: Rootkit

Spyware

Trojan horse

Worm

Answer: Spyware

Question: Which of the following is designed to overload a buffer with data, causing a system crash or enabling arbitrary code execution?

Answer Choices: Buffer overflow

SQL injection

Cross-site scripting

Spoofing

Answer: Buffer overflow

Question: Which of the following best describes cyber forensics?

Answer Choices: Collecting and analyzing digital evidence for legal cases

Writing secure code

Encrypting digital data

Designing secure systems

Answer: Collecting and analyzing digital evidence for legal cases

Question: Which of the following attacks involves sending fraudulent communications that appear to come from a trusted source to steal sensitive information?

Answer Choices: Spoofing

Sniffing

Phishing

Pharming

Answer: Phishing

Question: Which of the following is a security attack where data is altered during transmission without detection?

Answer Choices: Replay attack

Modification attack

Man-in-the-middle attack

Spoofing attack

Answer: Modification attack

Question: Which of the following is a mathematical function that converts data into a fixed-size string of characters, typically used in password security?

Answer Choices: Encryption

Hashing

Decryption

Encoding

Answer: Hashing

Question: Which of the following refers to the practice of disguising malicious IP addresses as legitimate ones?

Answer Choices: Spoofing

Sniffing

Phishing

Spamming

Answer: Spoofing

Question: Which of the following protocols is commonly used to secure websites and encrypt web traffic?

Answer Choices: SSH

SSL/TLS

FTP

SMTP

Answer: SSL/TLS

Question: Which of the following is a program that appears legitimate but performs malicious activities when executed?

Answer Choices: Worm

Trojan horse

Virus

Spyware

Answer: Trojan horse

Question: Which of the following is a type of attack where the attacker resends valid data transmissions maliciously or fraudulently?

Answer Choices: Replay attack

Modification attack

Sniffing attack

Spoofing attack

Answer: Replay attack