[Chân trời] Trắc nghiệm Giáo dục quốc phòng và an ninh 10 bài 6 Một số hiểu biết về an ninh mạng
1. Which of the following is a strong password characteristic?
A. It is long, uses a mix of uppercase and lowercase letters, numbers, and symbols.
B. It is a common word found in a dictionary.
C. It is a sequence of easily guessable numbers, like 123456.
D. It is the same password used for multiple online accounts.
2. What is the significance of the HTTPS protocol in web browsing?
A. It indicates that the connection between the browser and the website is encrypted and secure.
B. It signifies that the website is purely informational and does not collect data.
C. It means the website is hosted on a local server.
D. It guarantees that the website is free from malware.
3. What is the role of a digital certificate in online security?
A. To verify the identity of a website or individual and enable secure, encrypted connections (e.g., SSL/TLS).
B. To store user login credentials securely.
C. To scan for malware on a computer.
D. To speed up the loading of web pages.
4. Which of the following is NOT a common type of cyber threat?
A. Malware (e.g., viruses, worms, ransomware)
B. Phishing attacks
C. Denial-of-Service (DoS) attacks
D. Cloud computing optimization
5. What is spoofing in the context of cybersecurity?
A. Disguising a communication from an unknown source as being from a known, trusted source.
B. Encrypting sensitive data before transmission.
C. Creating strong, unique passwords.
D. Monitoring network traffic for suspicious activity.
6. What is the primary purpose of cybersecurity?
A. To protect computer systems and networks from theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
B. To develop new software applications for businesses.
C. To increase the speed of internet connections.
D. To design graphical user interfaces for websites.
7. What does endpoint security refer to?
A. The protection of individual computing devices, such as laptops, desktops, and mobile phones.
B. The security of network servers.
C. The protection of data stored in the cloud.
D. The security of network infrastructure.
8. What does malware stand for?
A. Malicious software
B. Malfunctioning software
C. Manual software
D. Maintenance software
9. What is a social engineering attack?
A. An attack that exploits human psychology to gain access to systems or information, often through deception.
B. An attack that uses advanced coding techniques to bypass security.
C. An attack that targets hardware vulnerabilities.
D. An attack that disrupts network services.
10. What is a botnet in cybersecurity?
A. A network of compromised computers (bots) controlled remotely by an attacker to perform malicious tasks.
B. A secure server used for official government communications.
C. A software program that automatically updates system drivers.
D. A type of encrypted messaging application.
11. What is the main risk associated with using public Wi-Fi networks without a VPN?
A. Your data can be intercepted by malicious actors on the same network.
B. Your device may overheat.
C. Your internet speed will significantly decrease.
D. Your device will automatically update its operating system.
12. What is the primary purpose of a security audit?
A. To systematically evaluate the security of an organizations systems, policies, and procedures.
B. To develop new cybersecurity strategies.
C. To train employees on security awareness.
D. To install new security software.
13. What is the purpose of a software update or patch?
A. To fix security vulnerabilities, improve performance, and add new features.
B. To install advertisements on the software.
C. To collect user data for marketing purposes.
D. To slow down the computers processing speed.
14. What is ransomware?
A. A type of malware that encrypts a victims files and demands payment for their decryption.
B. A virus that causes a computer to crash repeatedly.
C. Software that automatically backs up your data.
D. A tool for enhancing network performance.
15. Which of these actions can help prevent identity theft online?
A. Sharing personal information only on secure (HTTPS) websites and being cautious about unsolicited requests for data.
B. Using the same simple password for all online accounts.
C. Clicking on any link in an email, regardless of the sender.
D. Publicly sharing your social security number for verification purposes.
16. What is the main goal of a phishing attack?
A. To trick individuals into revealing sensitive information, such as usernames, passwords, and credit card details.
B. To overload a server with traffic to make it unavailable.
C. To encrypt a victims files and demand a ransom.
D. To spread malicious software without the users knowledge.
17. What is a worm in the context of malware?
A. Malware that replicates itself to spread to other computers, often without user interaction.
B. Software that records user keystrokes.
C. A program that encrypts files for ransom.
D. A tool for remotely controlling a computer.
18. What is the purpose of an antivirus software?
A. To detect, prevent, and remove malicious software (malware) from computer systems.
B. To speed up internet browsing.
C. To store personal files securely in the cloud.
D. To encrypt sensitive data for transmission.
19. What is zero-day vulnerability?
A. A security flaw in software that is unknown to the vendor and for which no patch or fix currently exists.
B. A security update that is released on the zeroth day of the month.
C. A type of malware that self-destructs after zero days.
D. A security protocol designed for zero-bandwidth networks.
20. Which of the following is an example of data breach?
A. Unauthorized access and disclosure of sensitive information, such as personal records or financial data.
B. A system administrator deleting unnecessary files.
C. A user resetting their password.
D. A software program running smoothly.
21. What is the primary function of a firewall?
A. To monitor and control incoming and outgoing network traffic based on predetermined security rules.
B. To accelerate data transfer speeds.
C. To create backups of important data.
D. To recover deleted files from a hard drive.
22. What does VPN stand for?
A. Virtual Private Network
B. Very Private Network
C. Virtual Public Network
D. Visible Private Network
23. What is encryption in the context of cybersecurity?
A. The process of converting readable data into a code to prevent unauthorized access.
B. The process of deleting unnecessary files from a computer.
C. The process of backing up data to an external drive.
D. The process of speeding up network connections.
24. Why is it important to regularly back up your data?
A. To prevent data loss in case of hardware failure, cyberattacks, or accidental deletion.
B. To increase the processing speed of your computer.
C. To download new software applications.
D. To share files easily with friends.
25. What is two-factor authentication (2FA)?
A. A security process that requires users to provide two different authentication factors to verify their identity.
B. A password that consists of two words.
C. A type of encryption that uses two keys.
D. A network security protocol with two layers.