1) What is phishing? a) A type of malware that infects your device b) A scam where attackers try to steal your personal information via emails or websites that appear legitimate c) A method of securing your password d) A software used to block viruses 2) Which of the following is the best way to create a strong password? a) Use your name and birthdate b) Use a combination of letters, numbers, and special characters c) Use the same password for all your accounts d) Use the word "password" with numbers at the end 3) What does multi-factor authentication (MFA) do? a) It asks you for multiple passwords b) It secures your Wi-Fi network c) It encrypts your emails automatically d) It verifies your identity using more than one method, such as a password and a code sent to your phone 4) What should you do if you receive an email from an unknown sender with a link or attachment? a) Open the link and attachment to check if it's safe b) Click on the link to "unsubscribe" c) Forward it to your colleagues to see if they know what it is d) Ignore it and delete it immediately 5) What is the primary purpose of a firewall in cybersecurity? a) To monitor and filter incoming and outgoing network traffic based on security rules b) To speed up the internet connection c) To back up your data d) To encrypt your emails 6) What is the term for a software program designed to help secure your computer against viruses and malware? a) Antivirus software b) VPN (Virtual Private Network) c) Password manager d) Backup tool 7) Which of these actions is the best way to protect your device from viruses and malware? a) Only use public Wi-Fi networks b) Disable your firewall to prevent interference c) Download files only from trusted sources and keep your antivirus software up to date d) Avoid using strong passwords for easier access 8) What is a "Zero-Day" attack? a) An attack that happens on the first day of the month b) An attack that exploits a previously unknown vulnerability, for which no patch or fix is available c) An attack that involves stealing data from a secure database d) An attack on a computer system that has already been updated with the latest security patches 9) What is the purpose of a VPN? a) To protect your device from malware b) To back up your data automatically c) To speed up your internet connection d) To connect to a secure network over the internet, encrypting your data and hiding your location 10) What is ransomware? a) A method of securing your Wi-Fi network b) Software designed to recover deleted files c) A type of malware that locks your device or encrypts your files until a ransom is paid d) A tool to speed up your computer's performance 11) What is "patch management"? a) The process of updating software to fix vulnerabilities and bugs b) The process of blocking all incoming internet traffic c) The process of disabling unnecessary software features d) The process of backing up software applications 12) What is a "Denial of Service" (DoS) attack? a) An attack that compromises sensitive data by intercepting network traffic b) An attack that tries to make a computer or network resource unavailable by overwhelming it with traffic c) An attack that uses social engineering to steal login credentials d) An attack that infects a computer with a virus 13) Why is it important to regularly back up your data? a) To ensure your device runs efficiently b) To recover your files in case of data loss due to malware, theft, or hardware failure c) To protect your passwords from being stolen d) To free up storage space on your device 14) What does the term "data breach" refer to? a) The process of securing a network against threats b) The encryption of private data to protect it from cyberattacks c) What does the term "data breach" refer to? d) The unauthorized access or exposure of sensitive data 15) What is "social engineering" used for in a cyberattack? a) To deceive individuals into divulging confidential information b) To perform system updates automatically c) To install antivirus software d) To encrypt files and hold them for ransom 16) What does the acronym "VPN" stand for? a) Very Private Network b) Virtual Public Network c) Virtual Private Network d) Verified Protection Network 17) Which of these is an example of "malware"? a) A software tool that blocks hackers b) A program designed to harm or exploit a device or network c) A firewall protecting your network d) An encrypted message sent to a secure email address 18) What is the best way to secure sensitive data on a mobile device? a) Download as many apps as possible for added protection b) Only access public Wi-Fi for browsing c) Use biometric authentication (e.g., fingerprint or face recognition) and encrypt the device d) Use a simple password and share it with trusted individuals 19) What does "spoofing" mean in the context of cybersecurity? a) Installing malware on a device to monitor activity b) The process of backing up files to prevent data loss c) Encrypting a message to protect it from interception d) The act of impersonating someone or something in order to gain unauthorized access to systems or data 20) What is the difference between a virus and a worm? a) A virus requires a user to run or open a file, while a worm can spread automatically across networks b) A worm is harmless, while a virus damages files c) A virus is a type of firewall, while a worm is a type of malware d) A virus can only infect a device once, while a worm infects multiple devices

Tabla de clasificación

Estilo visual

Opciones

Cambiar plantilla

¿Restaurar actividad almacenada automáticamente: ?