
Cyber Security Basics

Quiz
•
Information Technology (IT)
•
University
•
Easy
Shashwot Shahi
Used 4+ times
FREE Resource
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the relationship between confidentiality, integrity, and availability in the CIA triad?
Confidentiality ensures data is accessible only to authorized users; integrity ensures data is unaltered; availability guarantees timely access to data.
Confidentiality ensures data is unaltered; integrity ensures data is accessible; availability guarantees data is encrypted.
Confidentiality guarantees timely access; integrity ensures data is encrypted; availability restricts access to authorized users.
Confidentiality and integrity both guarantee data availability.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of malware propagation, how does a worm differ from a virus in terms of its infection mechanism?
Worms require user interaction to spread, viruses spread autonomously.
Worms self-replicate and spread over networks without a host file, viruses attach to executable files and require user action.
Viruses spread through network vulnerabilities, worms attach to files.
Worms encrypt files, viruses delete files.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ransomware attack typically involves which of the following stages?
Data exfiltration, encryption, ransom demand, and decryption key delivery upon payment.
Immediate deletion of all user files.
Silent monitoring of user activity without file encryption.
Only stealing user credentials without file manipulation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios best exemplifies a man-in-the-middle (MITM) attack?
An attacker intercepts and alters communication between a user and a bank website without either party's knowledge.
An attacker floods a server with traffic to cause denial of service.
An attacker sends phishing emails to steal credentials.
An attacker exploits a buffer overflow vulnerability to gain access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does the implementation of HTTPS using SSL/TLS protocols protect against eavesdropping and tampering?
By encrypting data in transit and authenticating the server to the client.
By blocking all incoming traffic except from trusted IPs.
By scanning for malware at the network perimeter.
By storing passwords in encrypted form on the server.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the role of patch management in an organization's cybersecurity posture?
It ensures all software is updated regularly to mitigate known vulnerabilities and reduce attack surface.
It backs up data to prevent loss during attacks.
It monitors network traffic for suspicious activity.
It encrypts sensitive data at rest.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following social engineering techniques involves an attacker impersonating a trusted authority to extract information?
Phishing
Pretexting
Tailgating
Spear phishing
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
Encryption/Decryption

Quiz
•
University
47 questions
Exploring Mobile and Wireless Security

Quiz
•
University
39 questions
Y10 revisionr

Quiz
•
9th Grade - University
41 questions
Wireless Network Security Quiz

Quiz
•
University
40 questions
MIDTERMS REVIEWER NETWORKING

Quiz
•
University
40 questions
xtgfrt

Quiz
•
University
40 questions
Final Test preparation and recap

Quiz
•
University
40 questions
QUIZ 3 - Data Design and Database Management

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University