[Cánh diều] Trắc nghiệm Giáo dục quốc phòng và an ninh 10 bài 6 Một số hiểu biết về an ninh mạng
1. What is the main goal of ransomware?
A. To encrypt a victims files and demand a ransom payment for decryption.
B. To steal personal banking information.
C. To spread viruses to other computers.
D. To disrupt the operation of a website.
2. What does the acronym malware stand for?
A. Malicious software
B. Manual learning
C. Marketing logistics
D. Medical laboratory
3. What is the primary risk of sharing personal information on social media platforms?
A. Potential misuse of information for identity theft or targeted scams.
B. Reduced functionality of the platform.
C. Slower loading times for posts.
D. Increased advertising.
4. What is the main purpose of a security patch?
A. To fix a security vulnerability in software or hardware.
B. To add new features to an application.
C. To improve the graphical user interface.
D. To increase the speed of data processing.
5. Which of the following is NOT a common cybersecurity best practice?
A. Clicking on suspicious links in emails.
B. Using strong, unique passwords.
C. Enabling two-factor authentication.
D. Keeping software up-to-date.
6. Which of the following is considered a weak password practice?
A. Reusing the same password across multiple online accounts.
B. Creating a password with a mix of character types.
C. Using a password manager to generate complex passwords.
D. Changing passwords regularly.
7. What is the primary goal of cybersecurity?
A. To ensure the confidentiality, integrity, and availability of information and systems.
B. To develop new software applications.
C. To promote social media engagement.
D. To conduct market research for technology companies.
8. What is integrity in the context of information security?
A. Ensuring that information is accurate, complete, and has not been altered without authorization.
B. Ensuring that information is readily available to users.
C. Ensuring that information is protected from unauthorized viewing.
D. Ensuring that information is stored securely.
9. What is the main purpose of two-factor authentication (2FA)?
A. To add an extra layer of security by requiring two different verification factors.
B. To simplify the login process.
C. To increase internet speed.
D. To automatically update software.
10. Which of the following is an example of social engineering?
A. An attacker pretending to be a legitimate authority to trick someone into divulging confidential information.
B. Implementing strong encryption protocols for data transmission.
C. Regularly updating operating system software.
D. Using multi-factor authentication for logins.
11. Which of the following is a common type of cyber threat?
A. Phishing
B. Gardening
C. Cooking
D. Hiking
12. Which of these is a strong password characteristic?
A. Using a combination of upper and lower case letters, numbers, and symbols.
B. Using personal information like birthdate or name.
C. Using common words or phrases.
D. Using short, easily guessable sequences.
13. What is a zero-day vulnerability?
A. A vulnerability that is known to the vendor but has not yet been patched.
B. A vulnerability that is unknown to the vendor and for which no patch exists.
C. A vulnerability that has been publicly disclosed and fixed.
D. A vulnerability that only affects legacy systems.
14. What is a denial-of-service (DoS) attack?
A. An attack that overwhelms a system with traffic, making it unavailable to legitimate users.
B. An attack that steals user credentials.
C. An attack that installs malware on a system.
D. An attack that encrypts user data.
15. What is the primary function of an antivirus program?
A. To detect, prevent, and remove malicious software (malware).
B. To accelerate internet browsing speeds.
C. To manage cloud storage accounts.
D. To create backups of personal files.
16. What is the role of an Intrusion Detection System (IDS)?
A. To monitor network traffic for suspicious activity and alert administrators.
B. To encrypt all outgoing data.
C. To prevent unauthorized access to websites.
D. To manage user access permissions.
17. What is availability in the context of information security?
A. Ensuring that information and systems are accessible and usable when needed by authorized users.
B. Ensuring that information is kept secret from unauthorized parties.
C. Ensuring that information is accurate and consistent.
D. Ensuring that information is protected from unauthorized modification.
18. What is the purpose of a VPN (Virtual Private Network)?
A. To encrypt internet traffic and mask the users IP address for enhanced privacy and security.
B. To boost computer processing power.
C. To automatically clean temporary files.
D. To manage software licenses.
19. Which of the following best describes data encryption?
A. The process of converting data into a code to prevent unauthorized access.
B. The process of deleting unnecessary data files.
C. The process of sharing data with authorized users.
D. The process of backing up data to a remote server.
20. What does confidentiality mean in the context of information security?
A. Ensuring that information is accessible only to authorized individuals.
B. Ensuring that information is accurate and complete.
C. Ensuring that information is available when needed.
D. Ensuring that information is protected from damage.
21. What is the purpose of regular software updates in cybersecurity?
A. To patch security vulnerabilities and protect against new threats.
B. To introduce new features and improve performance.
C. To reduce the amount of storage space used.
D. To change the user interface.
22. What is the purpose of a firewall in network security?
A. To monitor and control incoming and outgoing network traffic based on predetermined security rules.
B. To speed up internet connections.
C. To store large amounts of data.
D. To create virtual private networks.
23. Which of the following is an example of phishing?
A. Receiving an email that appears to be from your bank asking you to click a link and verify your account details.
B. Downloading a software update for your operating system.
C. Changing your password to a stronger one.
D. Using a secure website for online shopping.
24. What is a botnet in the context of cybersecurity?
A. A network of compromised computers controlled by a single attacker to perform malicious tasks.
B. A secure network for scientific research.
C. A database for storing encrypted information.
D. A system for monitoring network performance.
25. What is the primary risk associated with public Wi-Fi networks?
A. Increased risk of data interception by unauthorized parties.
B. Slower internet speeds.
C. Limited access to certain websites.
D. Higher data usage charges.