Categories
Tests
About
Hello, Guest
Login
Open menu
Categories
Tests
About
Login
? Back to Cybersecurity
Beginner
~5 min
Cyber Security Basics
Test your basic cyber security knowledge.
Progress:
0
/25
Beginner • ~5 min
Q1. What is cybersecurity?
Select one answer • 1 pt
Writing computer programs
Managing social media
Protecting systems networks and data
Building hardware
Q2. What does CIA stand for in cybersecurity?
Select one answer • 1 pt
Central Intelligence Agency
Control Information Access
Certified Internet Authority
Confidentiality Integrity Availability
Q3. Which is an example of malware?
Select one answer • 1 pt
Patch
Antivirus
Firewall
Trojan Horse
Q4. What is phishing?
Select one answer • 1 pt
Blocking spam emails
Encrypting files
Network monitoring
Attempting to trick users into revealing info
Q5. Which password is strongest?
Select one answer • 1 pt
9f!Kq#2Lm@A
P@55w0rd
Welcome1
password123
Q6. What is two-factor authentication?
Select one answer • 1 pt
Two usernames
A password plus another verification step
Two passwords
Logging in twice
Q7. Which is a social engineering attack?
Select one answer • 1 pt
Brute force login
DDoS attack
SQL injection
Phishing email
Q8. What does a firewall do?
Select one answer • 1 pt
Backs up files
Encrypts data
Filters network traffic
Monitors employees
Q9. What is malware designed to do?
Select one answer • 1 pt
Update software
Cause harm or unauthorized actions
Protect systems
Improve performance
Q10. Which is a secure practice?
Select one answer • 1 pt
Reusing passwords
Disabling updates
Sharing credentials
Regular software patching
Q11. What is encryption?
Select one answer • 1 pt
Copying data
Deleting data
Compressing files
Converting data into unreadable form
Q12. What is a vulnerability?
Select one answer • 1 pt
A firewall rule
An antivirus scan
A system weakness
A secure setting
Q13. What does HTTPS provide?
Select one answer • 1 pt
Free hosting
Encrypted communication
Anonymous access
Faster browsing
Q14. Which attack floods a system with traffic?
Select one answer • 1 pt
Man in the middle
Keylogging
DDoS
Phishing
Q15. What is least privilege?
Select one answer • 1 pt
Disabled authentication
All users get admin access
Shared accounts
Users get minimum access needed
Q16. Which is personal data?
Select one answer • 1 pt
IP address only
Social Security number
Source code
CPU model
Q17. What is ransomware?
Select one answer • 1 pt
Backup software
Password manager
Malware that encrypts files for payment
Firewall type
Q18. Why are updates important?
Select one answer • 1 pt
They add ads
They slow systems
They remove features
They fix security flaws
Q19. What is a secure Wi-Fi practice?
Select one answer • 1 pt
Weak password
Public sharing
WPA2 or WPA3 encryption
Open network
Q20. What does antivirus software do?
Select one answer • 1 pt
Blocks all traffic
Detects and removes malware
Encrypts networks
Creates passwords
Q21. What is a data breach?
Select one answer • 1 pt
Maintenance window
Network upgrade
Unauthorized data access
System shutdown
Q22. Which is a phishing sign?
Select one answer • 1 pt
Proper grammar
Encrypted email
Known sender
Urgent message asking for info
Q23. What are backups used for?
Select one answer • 1 pt
Malware removal
Speed improvement
Data recovery
Access control
Q24. What is a strong security habit?
Select one answer • 1 pt
Clicking unknown links
Verifying email senders
Ignoring alerts
Sharing passwords
Q25. What is the main goal of cybersecurity?
Select one answer • 1 pt
Eliminate all risk
Stop internet usage
Protect digital assets
Make systems complex
Cancel
Submit answers