Cybersecurity Principles Quiz

Cybersecurity Principles Quiz

University

20 Qs

quiz-placeholder

Similar activities

Cybeteria Meetup July, 2025

Cybeteria Meetup July, 2025

University

20 Qs

CYBER CHALLANGES'24 QUIZ BATCH 1

CYBER CHALLANGES'24 QUIZ BATCH 1

University

20 Qs

Quiz on Privacy Concepts

Quiz on Privacy Concepts

University

20 Qs

Cybersecurity

Cybersecurity

University

20 Qs

Quiz Mobile Devices and Internet of Things

Quiz Mobile Devices and Internet of Things

University

20 Qs

NetworkDevices

NetworkDevices

University

20 Qs

WLAN Concepts

WLAN Concepts

University

25 Qs

Test Kemanan Komputer Pertemuan 01

Test Kemanan Komputer Pertemuan 01

University

16 Qs

Cybersecurity Principles Quiz

Cybersecurity Principles Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Yudhistira Nugraha

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hospital’s system was infected by ransomware that locked patient data. Doctors could not access patient histories. Which principle of cybersecurity is MOST affected?

Authenticity

Confidentiality

Integrity

Availability

Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A government website was hacked because the admin account still used the default password “Admin123”. What type of vulnerability is this?

Zero-day vulnerability

Misconfiguration

Malware injection

Insider threat

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nisa, a university staff member, accidentally clicked a phishing email link and exposed student data. This is an example of:

Human factor vulnerability

Denial of service

Supply chain attack

SQL Injection

Buffer overflow

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a security breach at a tech company, logs showed repeated login attempts from the same IP address with different passwords. What type of attack is this?

Phishing

Brute-force attack

SQL Injection

Watering hole attack

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An e-commerce company, managed by Heri, applied role-based access control to ensure only finance staff can access transaction records. Which principle is applied here?

Least privilege

Open design

Fail-safe default

Defense in depth

Accountability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malware spread through USB drives inside a government office, infecting 500 PCs. Which delivery vector is illustrated?

Phishing

Social engineering

Infected removable media

Insider attack

Misconfiguration

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer named Wahyu left detailed error messages on a public website, exposing server paths and database info. Which attack surface is enlarged?

Human attack surface

Software attack surface

Network attack surface

Supply chain surface

Physical attack surface

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?