Which cybersecurity technique is used to detect and respond to potential security breaches?
A) Firewall management B) Intrusion detection system (IDS) C) Data encryption D) Anti-virus software
Correct Answer: B) Intrusion detection system (IDS)
Explanation: An IDS monitors network traffic for suspicious activity and alerts administrators to potential security breaches.
Question 42
Which network topology connects each device to every other device in the network?
A) Star topology B) Bus topology C) Ring topology D) Mesh topology
Correct Answer: D) Mesh topology
Explanation: In a mesh topology, every device is connected directly to every other device, providing multiple pathways for data to travel through the network.
Question 43
Which programming language is known for its simplicity and readability, often used in beginner programming courses?
A) C++ B) Java C) Python D) Assembly
Correct Answer: C) Python
Explanation: Python is known for its simplicity and readability, making it a popular choice for beginner programmers and for tasks requiring rapid development.
Question 44
Which protocol is used to securely transfer files over a network using encryption?
A) FTP B) SFTP C) HTTP D) Telnet
Correct Answer: B) SFTP
Explanation: SFTP (Secure File Transfer Protocol) is a secure version of FTP that uses encryption to protect files during transfer.
Question 45
What is the primary purpose of data normalization in database design?
A) To increase data redundancy B) To ensure efficient data retrieval C) To organize data and reduce redundancy D) To compress data for storage
Correct Answer: C) To organize data and reduce redundancy
Explanation: Data normalization is the process of organizing data in a database to reduce redundancy and ensure consistency.
Question 46
Which of the following is a type of malware that disguises itself as legitimate software?
A) Worm B) Trojan horse C) Spyware D) Adware
Correct Answer: B) Trojan horse
Explanation: A Trojan horse is a type of malware that disguises itself as legitimate software to trick users into installing it, after which it can perform malicious actions.
Question 47
Which type of database stores data in key-value pairs, rather than in tables?
A) Relational database B) Graph database C) NoSQL database D) Flat-file database
Correct Answer: C) NoSQL database
Explanation: NoSQL databases store data in key-value pairs, making them more flexible for certain types of applications compared to relational databases.
Question 48
Which of the following is an advantage of cloud storage?
A) Increased hardware costs B) Remote access to data from anywhere with an internet connection C) Increased energy consumption D) Limited scalability
Correct Answer: B) Remote access to data from anywhere with an internet connection
Explanation: Cloud storage allows users to access their data from anywhere with an internet connection, providing flexibility and convenience.
Question 49
Which database language is commonly used to manage and query relational databases?
A) Python B) SQL C) XML D) JavaScript
Correct Answer: B) SQL
Explanation: SQL (Structured Query Language) is the standard language for managing and querying data in relational databases.
Question 50
Which of the following best describes a denial-of-service (DoS) attack?
A) An attempt to steal sensitive data B) A method of encrypting data for ransom C) An attempt to overwhelm a system with excessive traffic to make it unavailable D) A technique used to intercept network traffic
Correct Answer: C) An attempt to overwhelm a system with excessive traffic to make it unavailable
Explanation: A denial-of-service (DoS) attack attempts to flood a system with traffic to make it unavailable to users.