Categories
Tests
About
Hello, Guest
Login
Open menu
Categories
Tests
About
Login
? Back to Cybersecurity
Beginner
~5 min
Cyber Security Basics
Test your basic cyber security knowledge.
Progress:
0
/25
Beginner • ~5 min
Q1. What is cybersecurity?
Select one answer • 1 pt
Writing computer programs
Building hardware
Managing social media
Protecting systems networks and data
Q2. What does CIA stand for in cybersecurity?
Select one answer • 1 pt
Confidentiality Integrity Availability
Certified Internet Authority
Central Intelligence Agency
Control Information Access
Q3. Which is an example of malware?
Select one answer • 1 pt
Patch
Trojan Horse
Antivirus
Firewall
Q4. What is phishing?
Select one answer • 1 pt
Encrypting files
Network monitoring
Blocking spam emails
Attempting to trick users into revealing info
Q5. Which password is strongest?
Select one answer • 1 pt
password123
9f!Kq#2Lm@A
P@55w0rd
Welcome1
Q6. What is two-factor authentication?
Select one answer • 1 pt
Logging in twice
Two usernames
Two passwords
A password plus another verification step
Q7. Which is a social engineering attack?
Select one answer • 1 pt
Phishing email
Brute force login
SQL injection
DDoS attack
Q8. What does a firewall do?
Select one answer • 1 pt
Filters network traffic
Encrypts data
Monitors employees
Backs up files
Q9. What is malware designed to do?
Select one answer • 1 pt
Improve performance
Update software
Cause harm or unauthorized actions
Protect systems
Q10. Which is a secure practice?
Select one answer • 1 pt
Disabling updates
Regular software patching
Sharing credentials
Reusing passwords
Q11. What is encryption?
Select one answer • 1 pt
Compressing files
Copying data
Deleting data
Converting data into unreadable form
Q12. What is a vulnerability?
Select one answer • 1 pt
A firewall rule
A secure setting
A system weakness
An antivirus scan
Q13. What does HTTPS provide?
Select one answer • 1 pt
Free hosting
Encrypted communication
Faster browsing
Anonymous access
Q14. Which attack floods a system with traffic?
Select one answer • 1 pt
Man in the middle
Phishing
Keylogging
DDoS
Q15. What is least privilege?
Select one answer • 1 pt
Users get minimum access needed
Disabled authentication
Shared accounts
All users get admin access
Q16. Which is personal data?
Select one answer • 1 pt
Social Security number
IP address only
CPU model
Source code
Q17. What is ransomware?
Select one answer • 1 pt
Malware that encrypts files for payment
Backup software
Firewall type
Password manager
Q18. Why are updates important?
Select one answer • 1 pt
They remove features
They slow systems
They add ads
They fix security flaws
Q19. What is a secure Wi-Fi practice?
Select one answer • 1 pt
WPA2 or WPA3 encryption
Open network
Public sharing
Weak password
Q20. What does antivirus software do?
Select one answer • 1 pt
Creates passwords
Detects and removes malware
Encrypts networks
Blocks all traffic
Q21. What is a data breach?
Select one answer • 1 pt
Unauthorized data access
System shutdown
Maintenance window
Network upgrade
Q22. Which is a phishing sign?
Select one answer • 1 pt
Known sender
Proper grammar
Encrypted email
Urgent message asking for info
Q23. What are backups used for?
Select one answer • 1 pt
Data recovery
Malware removal
Access control
Speed improvement
Q24. What is a strong security habit?
Select one answer • 1 pt
Clicking unknown links
Verifying email senders
Sharing passwords
Ignoring alerts
Q25. What is the main goal of cybersecurity?
Select one answer • 1 pt
Make systems complex
Protect digital assets
Stop internet usage
Eliminate all risk
Cancel
Submit answers