SmartAssess.io
Login
? Back to Cybersecurity
Advanced ~5 min

Cyber Security Advanced 2

This intermediate assessment builds on core cybersecurity knowledge and explores more advanced topics such as attack vectors, encryption, access control, vulnerability management, and incident response. Intended for learners with foundational experience, the test emphasizes practical understanding of how cyber threats operate and how security controls are applied in real-world systems.

Progress: 0/30
Advanced • ~5 min
Q1. What is a zero-day exploit?
Select one answer • 1 pt
Q2. What does AES stand for in cryptography?
Select one answer • 1 pt
Q3. Which attack involves injecting malicious code into a website?
Select one answer • 1 pt
Q4. What is a man-in-the-middle (MITM) attack?
Select one answer • 1 pt
Q5. What is the purpose of a digital certificate?
Select one answer • 1 pt
Q6. Which protocol is used for secure email transmission?
Select one answer • 1 pt
Q7. What is SQL injection?
Select one answer • 1 pt
Q8. What does PKI stand for?
Select one answer • 1 pt
Q9. Which is an example of a rootkit?
Select one answer • 1 pt
Q10. What is cross-site request forgery (CSRF)?
Select one answer • 1 pt
Q11. In a penetration testing scenario, what is the primary goal of the reconnaissance phase?
Select one answer • 1 pt
Q12. Which hashing algorithm is considered secure for passwords?
Select one answer • 1 pt
Q13. What is ARP poisoning?
Select one answer • 1 pt
Q14. What does GDPR regulate?
Select one answer • 1 pt
Q15. During a penetration test, which tool is commonly used for network scanning and service enumeration?
Select one answer • 1 pt
Q16. What is multi-factor authentication (MFA)?
Select one answer • 1 pt
Q17. What is a buffer overflow attack?
Select one answer • 1 pt
Q18. In a penetration testing engagement, what does the term 'pivoting' refer to?
Select one answer • 1 pt
Q19. What is OAuth used for?
Select one answer • 1 pt
Q20. What does IDS stand for?
Select one answer • 1 pt
Q21. Which is a characteristic of asymmetric encryption?
Select one answer • 1 pt
Q22. What is a supply chain attack?
Select one answer • 1 pt
Q23. In a penetration testing scenario, how would you exploit a web application vulnerable to command injection?
Select one answer • 1 pt
Q24. Which tool is used for penetration testing?
Select one answer • 1 pt
Q25. What is zero trust architecture?
Select one answer • 1 pt
Q26. What is a cryptographic nonce?
Select one answer • 1 pt
Q27. During a red team penetration test, what technique involves masquerading as an insider to gain physical access?
Select one answer • 1 pt
Q28. What is forensic analysis in cybersecurity?
Select one answer • 1 pt
Q29. What does HIPAA protect?
Select one answer • 1 pt
Q30. Which is an advanced persistent threat (APT)?
Select one answer • 1 pt
Cancel