CTF_Practice
477 subscribers
35 photos
1 video
18 files
43 links
Download Telegram
Which of the following is an example of an intrusion detection system (IDS)?
Anonymous Quiz
19%
A) Antivirus software.
33%
B) Firewall.
2%
C) Virtual Private Network (VPN).
47%
D) Snort.
🥰1😱1
Which of the following techniques is used to detect and prevent polymorphic malware?
Anonymous Quiz
29%
A) Digital signatures.
50%
B) Heuristic analysis.
15%
C) Security patches.
6%
D) Network segmentation.
😱2
Hi
2
Should i create a separate channel for cyber securiy quiz ??
Anonymous Poll
62%
yes
38%
no
What does VPN stand for?

a) Virtual Private Network
b) Very Personal Notification
c) Verified Public Network
d) Virus Protection Network
Two-factor authentication (2FA) typically involves?


a) Using two different devices to access the internet
b) Answering two security questions
c) Providing two different passwords
d) Combining a password with another verification method
What is "pharming"?

a) A technique to harvest crops using computers
b) Redirecting users to a fake website to steal their information
c) A new type of social media platform
d) The act of releasing malware into the wild
👍1
What is a "firewall"?

a) A physical wall made of fire-resistant material
b) A security system that prevents unauthorized access to or from a private network
c) A tool used by firefighters to fight cyber threats
d) A type of antivirus software
What is the "principle of least privilege" in cybersecurity?

a) The idea that you should have as many privileges as possible
b) The concept that security is not necessary
c) Giving users the maximum privileges to avoid inconvenience
d) Providing users with only the minimum privileges necessary to perform their tasks securely
What is the primary goal of red teaming in cybersecurity?

a) Developing software applications
b) Identifying vulnerabilities and weaknesses
c) Deploying antivirus software
d) Creating strong passwords
Red teaming often involves simulating attacks similar to those conducted by?

a) Law enforcement agencies
b) Hacktivist groups
c) Competing businesses
d) Cybersecurity defenders
In red teaming, what is "exfiltration"?

a) The process of infiltrating an organization
b) The act of extracting sensitive information from a target
c) The initial reconnaissance phase
d) A social engineering technique
What is "open-source intelligence" (OSINT) in the context of red teaming?

a) Intelligence gathered from secret sources
b) Intelligence gathered from paid informants
c) Intelligence gathered from publicly available sources
d) Intelligence gathered from competitors