/10 Scholarship Test 1 / 10 1. Which of the following is a common type of cyber attack that involves overwhelming a service with traffic? Phishing DDoS (Distributed Denial of Service) Ransomware Man-in-the-Middle 2 / 10 2. What is the primary purpose of a firewall in network security? To monitor user behavior To encrypt data To filter incoming and outgoing network traffic To store backup data 3 / 10 3. What is the primary purpose of an IP address? To identify a computer on a network To store data To protect against malware To enhance graphics 4 / 10 4. What is two-factor authentication (2FA)? A method of data encryption A security process that requires two forms of identification A type of computer virus A network monitoring tool 5 / 10 5. What does the acronym "VPN" stand for? Virtual Private Network Variable Protocol Network Verified Private Network Virtual Public Network 6 / 10 6. Which protocol is used to secure communication over the internet? HTTP FTP HTTPS SMTP 7 / 10 7. Which of the following is NOT a type of malware? Virus Worm Firewall Trojan 8 / 10 8. What does API stand for? Application Programming Interface Automated Process Interface Advanced Programming Integration Application Performance Index 9 / 10 9. What technology is used to create virtual machines? Virtualization Automation Cloud Computing Compression 10 / 10 10. What does IoT stand for? Internet of Technology Internet of Things Integrated Operating Technology Internal Operating Tool 0%