Deloitte Cyber Security Quiz-1

Question 1

Time: 00:00:00
What does the term "Phishing" refer to in cybersecurity?

Catching harmful software

Catching harmful software

Deceptive attempt to obtain sensitive information

Deceptive attempt to obtain sensitive information

Creating secure passwords

Creating secure passwords

Protecting against malware

Protecting against malware

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 2

Time: 00:00:00
What is a firewall used for in a network?

Protect against physical damage

Protect against physical damage

Improve network aesthetics

Improve network aesthetics

Enhance internet speed

Enhance internet speed

Block unauthorized access

Block unauthorized access

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 3

Time: 00:00:00
What is the purpose of encryption in cybersecurity?

Speed up internet connections

Speed up internet connections

Increase vulnerability to attacks

Increase vulnerability to attacks

Hide the location of a device

Hide the location of a device

Securely transmit and store data

Securely transmit and store data

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 4

Time: 00:00:00
Which of the following is a type of malware that spreads by attaching itself to other programs?

Spyware

Spyware

Adware

Adware

Worm

Worm

Trojan

Trojan

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 5

Time: 00:00:00
What is the primary goal of a Distributed Denial of Service (DDoS) attack?


Steal sensitive information

Steal sensitive information

Disrupt normal functioning of a system

Disrupt normal functioning of a system

Gain unauthorized access

Gain unauthorized access

Install malicious software

Install malicious software

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 6

Time: 00:00:00
Which authentication factor involves something you know?

Biometric

Biometric

Something you have

Something you have

Something you are

Something you are

Something you know

Something you know

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 7

Time: 00:00:00
What is the purpose of a Virtual Private Network (VPN)?

Increase network speed

Increase network speed

Enhance device aesthetics

Enhance device aesthetics

Securely connect to a private network over the internet

Securely connect to a private network over the internet

Block malware

Block malware

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 8

Time: 00:00:00
What does the term "Zero Day Exploit" refer to?

Exploiting software vulnerabilities before a patch is available

Exploiting software vulnerabilities before a patch is available

Exploiting old software

Exploiting old software

Exploiting networks with zero security

Exploiting networks with zero security

Exploiting hardware vulnerabilities

Exploiting hardware vulnerabilities

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 9

Time: 00:00:00
What is the purpose of an Intrusion Detection System (IDS)?


Block internet access

Block internet access

Detect and respond to suspicious activities

Detect and respond to suspicious activities

Enhance device performance

Enhance device performance

Encrypt data

Encrypt data

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

Question 10

Time: 00:00:00
Which cybersecurity principle ensures that data is not altered during transmission?

Confidentiality

Confidentiality

Authentication

Authentication

Integrity

Integrity

Availability

Availability

Once you attempt the question then PrepInsta explanation will be displayed.

Please login to submit your explanation

Start

["0","40","60","80","100"]
["Need more practice!","Keep trying!","Not bad!","Good work!","Perfect!"]

Completed

0/0

Accuracy

0%

Get Prepinsta Prime

Get all 200+ courses offered by Prepinsta

Never Miss an OffCampus Update

Get OffCampus Updates on Social Media from PrepInsta

Follow us on our Media Handles, we post out OffCampus drives on our Instagram, Telegram, Discord, Whatsdapp etc.

Get Hiring Updates
Amazon,Google,Delottie & 30+companies are hiring ! Get hiring Updates right in your inbox from PrepInsta

Get over 200+ course One Subscription

Courses like AI/ML, Cloud Computing, Ethical Hacking, C, C++, Java, Python, DSA (All Languages), Competitive Coding (All Languages), TCS, Infosys, Wipro, Amazon, DBMS, SQL and others.

Get over 200+ course One Subscription

Courses like AI/ML, Cloud Computing, Ethical Hacking, C, C++, Java, Python, DSA (All Languages), Competitive Coding (All Languages), TCS, Infosys, Wipro, Amazon, DBMS, SQL and others.

Get PrepInsta Prime Subscription

Get access to all the courses that PrepInsta offers, check the out below -

Companies

TCS, Cognizant, Delloite, Infosys, Wipro, CoCubes, KPMG, Amazone, ZS Associates, Accenture, Congnizant & other 50+ companies

Programming

Data Structures, Top 500 Codes, C, C++, Java Python & other 10+ subjects

Skills

Full Stack Web Development, Data Science, Machine Learning, AWS Cloud, & other 10+ skills and 20+ projects