/10 Scholarship Test 1 / 10 1. Which of the following is a common type of cyber attack that involves overwhelming a service with traffic? Phishing DDoS (Distributed Denial of Service) Ransomware Man-in-the-Middle 2 / 10 2. What technology is used to create virtual machines? Virtualization Automation Cloud Computing Compression 3 / 10 3. What does API stand for? Application Programming Interface Automated Process Interface Advanced Programming Integration Application Performance Index 4 / 10 4. Which protocol is used to secure communication over the internet? HTTP FTP HTTPS SMTP 5 / 10 5. Which of the following is NOT a type of malware? Virus Worm Firewall Trojan 6 / 10 6. What does IoT stand for? Internet of Technology Internet of Things Integrated Operating Technology Internal Operating Tool 7 / 10 7. What does the acronym "VPN" stand for? Virtual Private Network Variable Protocol Network Verified Private Network Virtual Public Network 8 / 10 8. What is the primary purpose of a firewall in network security? To monitor user behavior To encrypt data To filter incoming and outgoing network traffic To store backup data 9 / 10 9. What is the primary purpose of an IP address? To identify a computer on a network To store data To protect against malware To enhance graphics 10 / 10 10. What is two-factor authentication (2FA)? A method of data encryption A security process that requires two forms of identification A type of computer virus A network monitoring tool 0%