Multiple Choice Questions
Cybersecurity: Advanced Threats and Defense
Topic: Cybersecurity: Advanced Threats and Defense
Grade: 11
Question 1:
Which of the following is a technique used by hackers to gain unauthorized access to a computer network?
A) Cross-site scripting
B) Social engineering
C) Distributed denial-of-service (DDoS) attack
D) SQL injection
Answer: B) Social engineering
Explanation: Social engineering is a technique used by hackers to manipulate people into providing sensitive information or granting access to a system. This can involve tactics such as impersonating a trusted individual, phishing emails, or phone scams. For example, a hacker may pretend to be a bank representative and call a person to ask for their account details. This is a complex threat as it relies on exploiting human vulnerabilities rather than technical vulnerabilities.
Question 2:
Which of the following is an example of a symmetric encryption algorithm?
A) RSA
B) Diffie-Hellman
C) AES
D) SHA-256
Answer: C) AES (Advanced Encryption Standard)
Explanation: AES is a symmetric encryption algorithm, which means the same key is used for both encryption and decryption. It is widely used for securing sensitive information such as financial transactions and personal data. For example, if Alice wants to send an encrypted message to Bob using AES, she would use the same key to encrypt the message that Bob would use to decrypt it. This is a complex defense mechanism as it ensures confidentiality of the data being transmitted.
Question 3:
Which of the following is an example of a zero-day vulnerability?
A) Heartbleed
B) WannaCry
C) Stuxnet
D) Shellshock
Answer: B) WannaCry
Explanation: WannaCry is an example of a zero-day vulnerability, which refers to a software vulnerability that is unknown to the software vendor. It was a ransomware attack that exploited a vulnerability in the Windows operating system. This attack spread rapidly in 2017, affecting thousands of computers worldwide. This is a complex threat as it took advantage of a previously unknown vulnerability, making it difficult for organizations to defend against.
Question 4:
Which of the following is a technique used to detect and prevent network intrusions?
A) Firewall
B) Antivirus software
C) Intrusion Detection System (IDS)
D) Virtual Private Network (VPN)
Answer: C) Intrusion Detection System (IDS)
Explanation: An Intrusion Detection System (IDS) is a security technology that monitors network traffic for suspicious activities or patterns. It can detect and alert administrators of potential intrusions or attacks. For example, if an IDS detects a large amount of traffic from a specific IP address, it may indicate a distributed denial-of-service (DDoS) attack. This is a complex defense mechanism as it helps organizations proactively identify and respond to potential security breaches.
Question 5:
Which of the following is a common vulnerability associated with wireless networks?
A) Cross-site scripting
B) Man-in-the-middle attack
C) SQL injection
D) Buffer overflow
Answer: B) Man-in-the-middle attack
Explanation: A man-in-the-middle (MITM) attack occurs when a hacker intercepts communication between two parties without their knowledge. In the context of wireless networks, an attacker may position themselves between a user and a Wi-Fi access point, allowing them to eavesdrop on the communication or even manipulate it. This is a complex threat as it can be difficult to detect and can lead to unauthorized access or information theft.
Question 6:
Which of the following is a principle of least privilege?
A) Separation of duties
B) Defense-in-depth
C) Open design
D) Security through obscurity
Answer: A) Separation of duties
Explanation: The principle of least privilege is the concept of giving users or processes only the minimum access rights necessary to perform their tasks. This reduces the potential impact of a security breach or unauthorized access. For example, an organization may assign different roles to employees, ensuring that no single person has complete control over critical systems. This is a complex defense mechanism as it limits the potential damage that can be caused by a compromised account.
Question 7:
Which of the following is a technique used by hackers to gain unauthorized access to a system by guessing passwords?
A) Brute force attack
B) Phishing
C) Social engineering
D) Trojan horse
Answer: A) Brute force attack
Explanation: A brute force attack is a method used by hackers to gain access to a system by systematically trying all possible combinations of passwords until the correct one is found. This can be a time-consuming process, but it can be effective if the password is weak or easily guessable. For example, an attacker may use automated software to try thousands of commonly used passwords in a short amount of time. This is a complex threat as it relies on the vulnerability of weak passwords.
Question 8:
Which of the following is a technique used to hide malicious code within legitimate software?
A) Trojan horse
B) Denial-of-service (DoS) attack
C) Cross-site scripting
D) SQL injection
Answer: A) Trojan horse
Explanation: A Trojan horse is a type of malware that disguises itself as legitimate software, tricking users into installing it. Once installed, it can perform various malicious activities, such as stealing sensitive information or providing unauthorized access to the attacker. For example, a user may download a seemingly harmless game, but it contains a hidden Trojan horse that secretly installs additional malware on their system. This is a complex threat as it relies on deceiving users into thinking the software is safe.
Question 9:
Which of the following is a technique used to protect data by making it unreadable to unauthorized users?
A) Encryption
B) Firewall
C) Intrusion Detection System (IDS)
D) Antivirus software
Answer: A) Encryption
Explanation: Encryption is the process of converting data into a form that is unreadable without a specific decryption key. This ensures that even if unauthorized users gain access to the data, they cannot understand or use it. For example, when transmitting sensitive information over the internet, encryption can be used to protect the data from being intercepted and understood by attackers. This is a complex defense mechanism as it provides a strong level of confidentiality for the data.
Question 10:
Which of the following is an example of a network security protocol used to secure wireless communication?
A) SSL/TLS
B) HTTP
C) DNS
D) SMTP
Answer: A) SSL/TLS (Secure Sockets Layer/Transport Layer Security)
Explanation: SSL/TLS is a network security protocol that provides encryption and authentication for secure communication over the internet. It is commonly used to secure websites, email communication, and other network protocols. For example, when accessing a secure website (HTTPS), SSL/TLS ensures that the data exchanged between the user\’s browser and the website\’s server is encrypted and cannot be intercepted. This is a complex defense mechanism as it protects the confidentiality and integrity of the data being transmitted.
Question 11:
Which of the following is a technique used by hackers to manipulate a website\’s database by injecting malicious SQL code?
A) Cross-site scripting
B) Man-in-the-middle attack
C) SQL injection
D) Buffer overflow
Answer: C) SQL injection
Explanation: SQL injection is a technique used by hackers to exploit vulnerabilities in a website\’s database by inserting malicious SQL code into user inputs. This can allow an attacker to manipulate or extract data from the database, potentially leading to unauthorized access or data leakage. For example, an attacker may enter specially crafted SQL code into a login form to bypass authentication and gain access to the system. This is a complex threat as it relies on vulnerabilities in the website\’s code.
Question 12:
Which of the following is a principle of secure coding practices?
A) Input validation
B) Least privilege
C) Defense-in-depth
D) Open design
Answer: A) Input validation
Explanation: Input validation is a secure coding practice that involves validating and sanitizing user inputs to prevent vulnerabilities such as code injection or cross-site scripting. By validating inputs, developers can ensure that only expected and safe data is processed by the application, reducing the risk of security vulnerabilities. For example, a web application that accepts user input should validate and sanitize the input to prevent potential attacks. This is a complex defense mechanism as it helps prevent common security vulnerabilities.
Question 13:
Which of the following is a technique used to protect against phishing attacks?
A) Two-factor authentication
B) Intrusion Detection System (IDS)
C) Firewall
D) Encryption
Answer: A) Two-factor authentication
Explanation: Two-factor authentication (2FA) adds an extra layer of security to the authentication process by requiring users to provide two forms of identification, typically a password and a unique code sent to their mobile device. This helps protect against phishing attacks as even if an attacker obtains the user\’s password, they would still need the second factor (e.g., the code) to gain access. For example, when logging into an online banking account, the user may be prompted to enter a password and a code received on their phone. This is a complex defense mechanism as it significantly reduces the risk of unauthorized access.
Question 14:
Which of the following is a technique used by hackers to overload a server and make it unavailable to users?
A) Cross-site scripting
B) Distributed denial-of-service (DDoS) attack
C) SQL injection
D) Buffer overflow
Answer: B) Distributed denial-of-service (DDoS) attack
Explanation: A distributed denial-of-service (DDoS) attack is a technique used by hackers to overwhelm a server or network with a flood of traffic, making it unavailable to legitimate users. This is typically achieved by coordinating multiple compromised computers (botnet) to send a large amount of traffic to the target. For example, an attacker may use a botnet to flood a website with requests, causing the server to become overloaded and unresponsive. This is a complex threat as it can disrupt the availability of online services and cause significant financial losses.
Question 15:
Which of the following is a technique used to protect against malware infections?
A) Intrusion Detection System (IDS)
B) Antivirus software
C) Firewall
D) Virtual Private Network (VPN)
Answer: B) Antivirus software
Explanation: Antivirus software is a security technology that detects, prevents, and removes malware infections on a computer or network. It scans files and processes for known patterns or behaviors associated with malware and takes appropriate actions to mitigate the threat. For example, if a file is identified as malicious, the antivirus software may quarantine or delete the file to prevent further damage. This is a complex defense mechanism as it helps protect against a wide range of malware threats.