Which of the following is NOT a type of cyber attack?
A. Phishing
B. Spam
C. Identity theft
D. Spoofing
Answer: B
Explanation: Spam refers to unsolicited bulk emails, while phishing, identity theft, and spoofing are all forms of cyber attacks.
Question 2
Which of the following is NOT a cloud computing service model?
A. Software as a Service (SaaS)
B. Platform as a Service (PaaS)
C. Infrastructure as a Service (IaaS)
D. Function as a Service (FaaS)
Answer: D
Explanation: While SaaS, PaaS, and IaaS are cloud computing service models, Function as a Service (FaaS) is a serverless computing model.
Question 3
What is the purpose of using encryption algorithms?
A. Encrypting data to make it readable by recipients
B. Hiding the content of data from unauthorized access
C. Converting plain text into ciphertext
D. Decrypting data for authorized users
Answer: B
Explanation: Encryption algorithms are used to encode and hide the content of data, making it unreadable to unauthorized users and protecting it from security breaches.
Question 4
What does GDPR stand for?
A. General Data Protection Regulation
B. Global Data Protection Regulations
C. Government Data Protection Registry
D. General Digital Privacy Rules
Answer: A
Explanation: GDPR stands for General Data Protection Regulation, which is a legal framework that governs data protection and privacy for all individuals within the European Union.
Question 5
Which of the following is NOT an example of a web browser?
A. Google Chrome
B. Mozilla Firefox
C. Tor
D. Microsoft OneDrive
Answer: D
Explanation: Microsoft OneDrive is a cloud storage service, while Google Chrome, Mozilla Firefox, and Tor are all examples of web browsers.