Cybersecurity & Data Protection Policies MCQs with Answer
What is the primary goal of cybersecurity policies?
a) To monitor employees’ online activity
b) To protect digital data and systems from threats
c) To eliminate the need for passwords
d) To allow unrestricted internet access
Which of the following is a key principle of data protection?
a) Collecting unlimited personal data
b) Ensuring data accuracy and security
c) Selling user data to third parties
d) Ignoring data breaches
What does GDPR stand for?
a) General Data Processing Regulation
b) Global Data Privacy Regulation
c) General Data Protection Regulation
d) Government Data Policy Rules
Which type of cyberattack involves tricking users into revealing sensitive information?
a) Malware
b) Phishing
c) Denial-of-Service (DoS)
d) Ransomware
What is the purpose of encryption in cybersecurity?
a) To speed up internet connections
b) To make data unreadable without proper authorization
c) To track user activity online
d) To allow public access to private data
Which law regulates data protection in the European Union?
a) Digital Privacy Act
b) Cybersecurity Protection Act
c) General Data Protection Regulation (GDPR)
d) National Security Act
What is multi-factor authentication (MFA)?
a) Using one weak password for multiple accounts
b) A security system that requires multiple methods to verify identity
c) A tool to track internet activity
d) A way to bypass security measures
What does a firewall do in cybersecurity?
a) Speeds up internet browsing
b) Protects networks from unauthorized access
c) Encrypts emails automatically
d) Monitors employee productivity
Which of the following is an example of personally identifiable information (PII)?
a) Favorite movie genre
b) IP address
c) Home address and social security number
d) Browser history
What is the purpose of a data breach response policy?
a) To ignore security incidents
b) To outline steps for responding to and mitigating data breaches
c) To sell stolen data for profit
d) To delete all data after an attack
Which attack floods a network with excessive traffic to disrupt services?
a) Spyware
b) Trojan horse
c) Denial-of-Service (DoS)
d) Phishing
Which organization is responsible for setting global cybersecurity standards?
a) WHO
b) ISO (International Organization for Standardization)
c) UNESCO
d) FDA
What is the role of an intrusion detection system (IDS)?
a) To prevent hackers from using the internet
b) To detect unauthorized access to a network
c) To track website visits
d) To delete all cybersecurity logs
Which policy requires organizations to notify users about data breaches?
a) Cybercrime Prevention Act
b) Data Breach Notification Law
c) Fair Internet Act
d) Cybersecurity Surveillance Policy
What is ransomware?
a) A type of malware that encrypts files and demands payment
b) A security patch for operating systems
c) A tool used for ethical hacking
d) A government cybersecurity regulation
Which of the following is an example of strong password security?
a) Using “123456” for all accounts
b) Creating a password with random characters, numbers, and symbols
c) Writing passwords on sticky notes
d) Using the same password across all websites
What does “zero trust security” mean?
a) Assuming all users and devices are a security threat
b) Trusting all internal employees
c) Allowing unrestricted access to all systems
d) Ignoring cybersecurity threats
Which organization in the U.S. develops cybersecurity standards?
a) FDA
b) FCC
c) NIST (National Institute of Standards and Technology)
d) NASA
What is social engineering in cybersecurity?
a) Using AI for ethical hacking
b) Manipulating people to gain unauthorized access
c) Creating strong encryption methods
d) Enhancing software security
What is a VPN (Virtual Private Network) used for?
a) To improve internet speed
b) To encrypt internet connections and enhance privacy
c) To hack into networks
d) To store passwords
What is the main risk of using public Wi-Fi?
a) High internet speed
b) Exposure to cyberattacks and data interception
c) Increased privacy protection
d) Automatic encryption of personal data
Which cybersecurity framework helps organizations manage risks?
a) NIST Cybersecurity Framework
b) Internet Browsing Policy
c) Social Media Guidelines
d) Software Development Life Cycle
What is the primary function of an antivirus program?
a) To increase computer speed
b) To detect and remove malicious software
c) To block internet access
d) To store passwords
Which of the following is a form of biometric authentication?
a) Username and password
b) Fingerprint scanning
c) Security questions
d) CAPTCHA
What is the role of ethical hacking in cybersecurity?
a) To conduct illegal hacking activities
b) To improve security by testing vulnerabilities
c) To create ransomware
d) To bypass security measures
What is the purpose of a cybersecurity incident response plan?
a) To ignore security threats
b) To provide steps for handling cyber incidents
c) To disable security controls
d) To monitor employee emails