Crack the Cybersecurity Code Test your knowledge on cybersecurity concepts, practices, and tools that safeguard digital infrastructure and protect against cyber threats. remus2009 published on October 24 Stacked 1/12 Which device is essential for connecting a network securely to the internet? Modem Router Switch Firewall 2/12 Which of these is NOT a strong password practice? Changing passwords regularly Using personal information Avoiding dictionary words Using a mix of symbols and numbers 3/12 Which term refers to the process of converting data into a code? Archiving Defragmenting Encryption Scanning 4/12 What is multi-factor authentication? Using multiple passwords for a single login A single secure password policy Verifying identity through multiple methods Logging in multiple times for access 5/12 What does VPN stand for? Verified Personal Network Virtual Private Network Virtual Privacy Network Verified Protection Network 6/12 What is a zero-day exploit? Software phishing method A risk detected in less than 24 hours An attack exploiting an unknown flaw An outdated software vulnerability 7/12 What is the purpose of penetration testing? To install firewalls To improve antivirus software To find vulnerabilities in systems To reward ethical hackers 8/12 What type of attack involves overwhelming a system with traffic? SQL injection Man-in-the-middle attack Phishing Denial of Service (DoS) 9/12 Which of the following is a type of malware? Ransomware Antivirus VPN Firewall 10/12 Which of these is a common phishing tactic? Impersonating a known entity Sending bulk emails Using Trojan horses Deploying browser plugins 11/12 Which organization creates standards for internet security? ISO OSHA NIST FBI 12/12 What is the primary function of a firewall? To detect phishing emails To block unauthorized access To store passwords To encrypt data