Cybersecurity Basics Quiz Questions
1. Which of the following is NOT a fundamental principle of cybersecurity?
(a) Confidentiality
(b) Integrity
(c) Availability
(d) Accessibility
2. A firewall is a network security device that primarily functions to:
(a) Prevent unauthorized access to a network
(b) Detect malware
(c) Encrypt data
(d) Backup data
3. What is phishing?
(a) A type of malware that replicates itself
(b) A social engineering tactic used to obtain sensitive information
(c) A network attack that aims to disrupt services
(d) A technique used to encrypt data
4. Which of the following is a common type of malware?
(a) Virus
(b) Worm
(c) Trojan horse
(d) All of the above
5. What is the purpose of encryption?
(a) To make data unreadable to unauthorized parties
(b) To prevent data loss
(c) To detect malware
(d) To improve network performance
6. A strong password should be:
(a) Easy to remember
(b) Short and simple
(c) A combination of uppercase and lowercase letters, numbers, and symbols
(d) A single word
7. What is a social engineering attack?
(a) A type of malware that replicates itself
(b) A network attack that aims to disrupt services
(c) A technique used to manipulate people into revealing sensitive information
(d) A method of encrypting data
8. Which of the following is a best practice for cybersecurity?
(a) Using public Wi-Fi networks for sensitive activities
(b) Clicking on links in unsolicited emails
(c) Keeping software and operating systems up-to-date
(d) Sharing your passwords with trusted friends and family
9. What is a patch?
(a) A software update that fixes vulnerabilities
(b) A type of malware
(c) A network security device
(d) A social engineering tactic
10. What is a VPN (Virtual Private Network)?
(a) A type of malware
(b) A network security device
(c) A software that creates a secure encrypted connection over a public network
(d) A social engineering tactic
11. Which of the following is a common cybersecurity threat?
(a) Phishing
(b) Malware
(c) Identity theft
(d) All of the above
12. What is the CIA triad in cybersecurity?
(a) Confidentiality, Integrity, Availability
(b) Cybersecurity, Information Assurance, Auditing
(c) Computer, Internet, Application
(d) Cryptography, Information, Authentication
13. What is a brute force attack?
(a) A type of malware
(b) A network attack that tries every possible combination of characters to guess a password
(c) A social engineering tactic
(d) A method of encrypting data
14. Which of the following is a best practice for data backup?
(a) Storing backups on the same device as the original data
(b) Backing up data regularly
(c) Using a single backup method
(d) Keeping backups for a short period
15. What is a firewall rule?
(a) A set of instructions that determines which traffic is allowed or blocked
(b) A type of malware
(c) A social engineering tactic
(d) A method of encrypting data
16. What is two-factor authentication?
(a) Using two different passwords for a single account
(b) Using a combination of something you know (password) and something you have (physical token) for authentication
(c) Using a single password for all online accounts
(d) Using a combination of two different networks for internet access
17. What is a denial-of-service (DoS) attack?
(a) A type of malware
(b) A network attack that aims to overload a system and make it inaccessible
(c) A social engineering tactic
(d) A method of encrypting data
18. What is a honeypot?
(a) A type of malware
(b) A decoy system designed to attract attackers
(c) A social engineering tactic
(d) A method of encrypting data
19. Which of the following is a common cybersecurity certification?
(a) Certified Information Systems Security Professional (CISSP)
(b) Certified Ethical Hacker (CEH)
(c) Certified Information Security Manager (CISM)
(d) All of the above
20. What is the purpose of a security incident response plan (SIRP)?
(a) To provide a structured approach to responding to security incidents
(b) To prevent security incidents from occurring
(c) To detect malware
(d) To encrypt data
21. Which of the following is a common cybersecurity framework?
(a) NIST Cybersecurity Framework
(b) ISO 27001
(c) CIS Controls
(d) All of the above
22. What is a vulnerability?
(a) A weakness in a system that can be exploited
(b) A security threat
(c) A security control
(d) A security incident
23. What is the purpose of a security audit?
(a) To identify vulnerabilities in a system
(b) To prevent data loss
(c) To detect viruses
(d) To encrypt data
24. What is the purpose of a security policy?
(a) To define the organization’s security goals and guidelines
(b) To prevent data loss
(c) To detect viruses
(d) To encrypt data
25. What is the role of a security awareness training program?
(a) To prevent data loss
(b) To educate employees about security best practices
(c) To detect viruses
(d) To encrypt data
Cybersecurity Basics Quiz Questions with Answers
1. Which of the following is NOT a fundamental principle of cybersecurity?
(d) Accessibility
2. A firewall is a network security device that primarily functions to:
(a) Prevent unauthorized access to a network
3. What is phishing?
(b) A social engineering tactic used to obtain sensitive information
4. Which of the following is a common type of malware?
(d) All of the above
5. What is the purpose of encryption?
(a) To make data unreadable to unauthorized parties
6. A strong password should be:
(c) A combination of uppercase and lowercase letters, numbers, and symbols
7. What is a social engineering attack?
(c) A technique used to manipulate people into revealing sensitive information
8. Which of the following is a best practice for cybersecurity?
(c) Keeping software and operating systems up-to-date
9. What is a patch?
(a) A software update that fixes vulnerabilities
10. What is a VPN (Virtual Private Network)?
(c) A software that creates a secure encrypted connection over a public network
11. Which of the following is a common cybersecurity threat?
(b) Malware
12. What is the CIA triad in cybersecurity?
(a) Confidentiality, Integrity, Availability
13. What is a brute force attack?
(b) A network attack that tries every possible combination of characters to guess a password
14. Which of the following is a best practice for data backup?
(b) Backing up data regularly
15. What is a firewall rule?
(a) A set of instructions that determines which traffic is allowed or blocked
16. What is two-factor authentication?
(b) Using a combination of something you know (password) and something you have (physical token) for authentication
17. What is a denial-of-service (DoS) attack?
(b) A network attack that aims to overload a system and make it inaccessible
18. What is a honeypot?
(b) A decoy system designed to attract attackers
19. Which of the following is a common cybersecurity certification?
(a) Certified Information Systems Security Professional (CISSP)
20. What is the purpose of a security incident response plan (SIRP)?
(a) To provide a structured approach to responding to security incidents
21. Which of the following is a common cybersecurity framework?
(b) ISO 27001
22. What is a vulnerability?
(a) A weakness in a system that can be exploited
23. What is the purpose of a security audit?
(a) To identify vulnerabilities in a system
24. What is the purpose of a security policy?
(a) To define the organization’s security goals and guidelines
25. What is the role of a security awareness training program?
(b) To educate employees about security best practices