Governance & Public Policies

Cybersecurity & Data Protection Policies MCQs with Answer

What is the primary goal of cybersecurity policies?
a) To monitor employees’ online activity
b) To protect digital data and systems from threats
c) To eliminate the need for passwords
d) To allow unrestricted internet access

Answer
b) To protect digital data and systems from threats

Which of the following is a key principle of data protection?
a) Collecting unlimited personal data
b) Ensuring data accuracy and security
c) Selling user data to third parties
d) Ignoring data breaches

Answer
b) Ensuring data accuracy and security

What does GDPR stand for?
a) General Data Processing Regulation
b) Global Data Privacy Regulation
c) General Data Protection Regulation
d) Government Data Policy Rules

Answer
c) General Data Protection Regulation

Which type of cyberattack involves tricking users into revealing sensitive information?
a) Malware
b) Phishing
c) Denial-of-Service (DoS)
d) Ransomware

Answer
b) Phishing

What is the purpose of encryption in cybersecurity?
a) To speed up internet connections
b) To make data unreadable without proper authorization
c) To track user activity online
d) To allow public access to private data

Answer
b) To make data unreadable without proper authorization

Which law regulates data protection in the European Union?
a) Digital Privacy Act
b) Cybersecurity Protection Act
c) General Data Protection Regulation (GDPR)
d) National Security Act

Answer
c) General Data Protection Regulation (GDPR)

What is multi-factor authentication (MFA)?
a) Using one weak password for multiple accounts
b) A security system that requires multiple methods to verify identity
c) A tool to track internet activity
d) A way to bypass security measures

Answer
b) A security system that requires multiple methods to verify identity

What does a firewall do in cybersecurity?
a) Speeds up internet browsing
b) Protects networks from unauthorized access
c) Encrypts emails automatically
d) Monitors employee productivity

Answer
b) Protects networks from unauthorized access

Which of the following is an example of personally identifiable information (PII)?
a) Favorite movie genre
b) IP address
c) Home address and social security number
d) Browser history

Answer
c) Home address and social security number

What is the purpose of a data breach response policy?
a) To ignore security incidents
b) To outline steps for responding to and mitigating data breaches
c) To sell stolen data for profit
d) To delete all data after an attack

Answer
b) To outline steps for responding to and mitigating data breaches

Which attack floods a network with excessive traffic to disrupt services?
a) Spyware
b) Trojan horse
c) Denial-of-Service (DoS)
d) Phishing

Answer
c) Denial-of-Service (DoS)

Which organization is responsible for setting global cybersecurity standards?
a) WHO
b) ISO (International Organization for Standardization)
c) UNESCO
d) FDA

Answer
b) ISO (International Organization for Standardization)

What is the role of an intrusion detection system (IDS)?
a) To prevent hackers from using the internet
b) To detect unauthorized access to a network
c) To track website visits
d) To delete all cybersecurity logs

Answer
b) To detect unauthorized access to a network

Which policy requires organizations to notify users about data breaches?
a) Cybercrime Prevention Act
b) Data Breach Notification Law
c) Fair Internet Act
d) Cybersecurity Surveillance Policy

Answer
b) Data Breach Notification Law

What is ransomware?
a) A type of malware that encrypts files and demands payment
b) A security patch for operating systems
c) A tool used for ethical hacking
d) A government cybersecurity regulation

Answer
a) A type of malware that encrypts files and demands payment

Which of the following is an example of strong password security?
a) Using “123456” for all accounts
b) Creating a password with random characters, numbers, and symbols
c) Writing passwords on sticky notes
d) Using the same password across all websites

Answer
b) Creating a password with random characters, numbers, and symbols

What does “zero trust security” mean?
a) Assuming all users and devices are a security threat
b) Trusting all internal employees
c) Allowing unrestricted access to all systems
d) Ignoring cybersecurity threats

Answer
a) Assuming all users and devices are a security threat

Which organization in the U.S. develops cybersecurity standards?
a) FDA
b) FCC
c) NIST (National Institute of Standards and Technology)
d) NASA

Answer
c) NIST (National Institute of Standards and Technology)

What is social engineering in cybersecurity?
a) Using AI for ethical hacking
b) Manipulating people to gain unauthorized access
c) Creating strong encryption methods
d) Enhancing software security

Answer
b) Manipulating people to gain unauthorized access

What is a VPN (Virtual Private Network) used for?
a) To improve internet speed
b) To encrypt internet connections and enhance privacy
c) To hack into networks
d) To store passwords

Answer
b) To encrypt internet connections and enhance privacy

What is the main risk of using public Wi-Fi?
a) High internet speed
b) Exposure to cyberattacks and data interception
c) Increased privacy protection
d) Automatic encryption of personal data

Answer
b) Exposure to cyberattacks and data interception

Which cybersecurity framework helps organizations manage risks?
a) NIST Cybersecurity Framework
b) Internet Browsing Policy
c) Social Media Guidelines
d) Software Development Life Cycle

Answer
a) NIST Cybersecurity Framework

What is the primary function of an antivirus program?
a) To increase computer speed
b) To detect and remove malicious software
c) To block internet access
d) To store passwords

Answer
b) To detect and remove malicious software

Which of the following is a form of biometric authentication?
a) Username and password
b) Fingerprint scanning
c) Security questions
d) CAPTCHA

Answer
b) Fingerprint scanning

What is the role of ethical hacking in cybersecurity?
a) To conduct illegal hacking activities
b) To improve security by testing vulnerabilities
c) To create ransomware
d) To bypass security measures

Answer
b) To improve security by testing vulnerabilities

What is the purpose of a cybersecurity incident response plan?
a) To ignore security threats
b) To provide steps for handling cyber incidents
c) To disable security controls
d) To monitor employee emails

Answer
b) To provide steps for handling cyber incidents

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button