Unit 3 - Practice Quiz

CSE121 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary definition of cybersecurity?

Introduction to cybersecurity-definition, importance in digital era Easy
A. The practice of designing new computer hardware.
B. The practice of protecting systems, networks, and programs from digital attacks.
C. The process of increasing a computer's processing speed.
D. The development of new mobile applications.

2 In the CIA Triad, which principle ensures that information is not disclosed to unauthorized individuals or systems?

CIA Triad (Confidentiality, Integrity, Availability) Easy
A. Authenticity
B. Availability
C. Integrity
D. Confidentiality

3 If a hacker successfully alters a record in a customer database, which principle of the CIA Triad has been violated?

CIA Triad (Confidentiality, Integrity, Availability) Easy
A. Integrity
B. Availability
C. Authorization
D. Confidentiality

4 A disgruntled employee who intentionally deletes company files is an example of what type of threat?

Cyber Threat Landscape: Insider vs External threats Easy
A. External Threat
B. Insider Threat
C. Phishing Threat
D. Zero-Day Threat

5 What is the general term for any software intentionally designed to cause disruption to a computer, server, or computer network?

Malwares Easy
A. Firmware
B. Adware
C. Shareware
D. Malware

6 An email that appears to be from your bank asking for your password to 'verify your account' is a common example of which attack?

Common cyber-attacks- Phishing and Social Engineering attacks Easy
A. Denial-of-Service attack
B. Phishing attack
C. Malware attack
D. Brute-force attack

7 Which type of attack involves an attacker trying every possible combination of characters to guess a password?

Password and brute-force attacks Easy
A. Social Engineering
B. Denial of Service
C. Brute-force attack
D. Phishing

8 What is the primary goal of a Denial of Service (DoS) attack?

Denial of Service (DoS) Easy
A. To steal a user's password
B. To make a machine or network resource unavailable to its intended users
C. To gain administrative control over a system
D. To encrypt a user's files and demand a ransom

9 A 'zero-day' attack is an attack that exploits a vulnerability that is...

Zero day attack Easy
A. ...only found in mobile operating systems.
B. ...only performed at midnight.
C. ...more than ten years old.
D. ...unknown to the software vendor or the public.

10 Which of the following indicates a secure, encrypted connection to a website?

secure web browsing Easy
A. The website loads very quickly
B. The website has a lot of images
C. The URL starts with http://
D. The URL starts with https://

11 Which security practice adds a second layer of protection to your accounts beyond just a password?

social media and email security Easy
A. Writing your password on a sticky note
B. Disabling all security notifications
C. Two-Factor Authentication (2FA)
D. Using the same password everywhere

12 What is a 'digital footprint'?

personal data protection and digital footprints Easy
A. The brand of your computer monitor.
B. The trail of data you leave behind when you use the internet.
C. A type of computer virus.
D. The physical size of your hard drive.

13 What is the primary use of the cybersecurity tool Wireshark?

Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems) Easy
A. Analyzing network traffic and capturing data packets
B. Scanning a network for open ports
C. Removing malware from a system
D. Cracking passwords

14 What is the main function of the tool Nmap?

Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems) Easy
A. To encrypt email communications
B. To discover hosts and services on a computer network
C. To edit text files
D. To create presentations

15 What does 'cybersecurity compliance' refer to?

cybersecurity compliance Easy
A. A competition between hackers.
B. Adhering to a set of laws and regulations designed to protect data.
C. A type of antivirus software.
D. The act of reporting a security breach.

16 Which cybersecurity job role is focused on ethically hacking into systems to find and report vulnerabilities?

Job roles and skill sets for cybersecurity Easy
A. Network Administrator
B. Penetration Tester (Ethical Hacker)
C. Database Administrator
D. Security Analyst

17 Ensuring that a website is online and accessible to authorized users when they need it relates to which principle of the CIA Triad?

CIA Triad (Confidentiality, Integrity, Availability) Easy
A. Availability
B. Accountability
C. Integrity
D. Confidentiality

18 What is the core principle behind social engineering attacks?

Common cyber-attacks- Phishing and Social Engineering attacks Easy
A. Guessing weak passwords
B. Using overwhelming computer power
C. Exploiting hardware failures
D. Manipulating human psychology to trick people

19 What type of malware encrypts a user's files and demands a payment to restore access?

Malware-based attacks Easy
A. Virus
B. Spyware
C. Adware
D. Ransomware

20 Which of the following is a good practice for protecting your personal data online?

personal data protection and digital footprints Easy
A. Using the same simple password for all websites.
B. Regularly reviewing the privacy settings on your accounts.
C. Sharing your home address publicly on your profile.
D. Accepting all friend requests on social media.

21 A ransomware attack encrypts a hospital's patient record system, preventing doctors from accessing critical patient data. Which component of the CIA triad is primarily compromised in this scenario?

CIA Triad (Confidentiality, Integrity, Availability) Medium
A. Confidentiality
B. Authentication
C. Availability
D. Integrity

22 A disgruntled system administrator uses their legitimate credentials to delete critical company databases a week after being fired. What type of threat does this action represent?

Cyber Threat Landscape: Insider vs External threats Medium
A. A social engineering attack
B. A passive insider threat
C. A malicious insider threat
D. An external threat from a script kiddie

23 An attacker sends a highly targeted email to a company's CFO, impersonating the CEO and urgently requesting a wire transfer to a new vendor. This email includes specific details about a recent company meeting. This is a prime example of:

Common cyber-attacks- Phishing and Social Engineering attacks Medium
A. Vishing
B. Spear Phishing
C. Smishing
D. General Phishing

24 A user downloads a free photo editing application. The application works as advertised, but it also secretly installs a keylogger that captures the user's keystrokes and sends them to an attacker. What type of malware best describes this photo editing application?

Malwares Medium
A. Spyware
B. Trojan Horse
C. Ransomware
D. Worm

25 An attacker has a list of the 10,000 most common passwords and is systematically trying them against a single user account. What specific type of password attack is this?

Password and brute-force attacks Medium
A. Dictionary Attack
B. Rainbow Table Attack
C. Brute-Force Attack
D. Credential Stuffing

26 What is the primary difference between a Denial of Service (DoS) attack and a Distributed Denial of Service (DDoS) attack?

Denial of Service (DoS) Medium
A. DoS attacks target network equipment, while DDoS attacks target servers.
B. DoS attacks originate from a single source, while DDoS attacks originate from multiple, distributed sources.
C. DoS attacks are always more powerful than DDoS attacks.
D. DoS attacks exploit software vulnerabilities, while DDoS attacks rely solely on overwhelming bandwidth.

27 A cybercriminal discovers a previously unknown flaw in a popular web browser's code. They develop an exploit to steal user data and use it before the software vendor can release a patch. This situation describes a:

Zero day attack Medium
A. Zero-day Attack
B. SQL Injection
C. Watering Hole Attack
D. Man-in-the-Middle Attack

28 A network administrator notices unusual traffic patterns on the corporate network and wants to inspect the actual contents of the data packets being sent to and from a specific server. Which tool would be most suitable for this task?

Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems) Medium
A. Nmap
B. Wireshark
C. Metasploit
D. John the Ripper

29 When you visit a banking website, you see https in the URL and a padlock icon. What does the 'S' in https primarily provide?

secure web browsing Medium
A. Anonymity for the user
B. Verification that the website has no malware
C. Encryption of the data exchanged between your browser and the server
D. Faster page loading speeds

30 A user searches for a product on an e-commerce website. Later, they see advertisements for that same product on various other websites they visit. This is primarily a result of their:

personal data protection and digital footprints Medium
A. Social media profile
B. Active digital footprint
C. Passive digital footprint
D. Encrypted email history

31 A company that processes, stores, and transmits credit card information must adhere to a specific set of security standards to protect cardholder data. Which compliance framework is being referred to?

cybersecurity compliance Medium
A. PCI-DSS (Payment Card Industry Data Security Standard)
B. SOX (Sarbanes-Oxley Act)
C. HIPAA (Health Insurance Portability and Accountability Act)
D. GDPR (General Data Protection Regulation)

32 A professional is hired to legally and ethically attempt to breach an organization's computer systems to find vulnerabilities before malicious hackers do. What is this job role commonly called?

Job roles and skill sets for cybersecurity Medium
A. Network Administrator
B. Forensic Analyst
C. Penetration Tester (Ethical Hacker)
D. Security Auditor

33 An unauthorized person gains access to a database and alters a customer's shipping address. Which principle of the CIA triad has been violated?

CIA Triad (Confidentiality, Integrity, Availability) Medium
A. Non-repudiation
B. Integrity
C. Availability only
D. Confidentiality only

34 Your computer suddenly becomes extremely slow, and you notice a large amount of network traffic even when you're not actively using the internet. Later, you find out your computer was part of a coordinated attack on a major website. Your machine has likely been compromised by what?

Malware-based attacks Medium
A. Adware
B. A Rootkit
C. A Logic Bomb
D. A Botnet

35 A security system analyzes network traffic in real-time, learning the 'normal' behavior of the network. It then flags any activity that deviates significantly from this established baseline as a potential threat. This describes the functionality of a(n):

Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems) Medium
A. AI-based threat detection system
B. Firewall with static rules
C. Port scanner like Nmap
D. Signature-based Intrusion Detection System (IDS)

36 Which of the following is the most effective security practice for protecting your email account from unauthorized access, even if your password is stolen?

social media and email security Medium
A. Enabling Two-Factor Authentication (2FA)
B. Changing your password every 30 days
C. Checking your email only on a private network
D. Using a very long and complex password

37 The 2017 Equifax data breach, which exposed the personal information of 147 million people, was primarily caused by the company's failure to:

case study of recent cyber incidents Medium
A. Patch a known software vulnerability in their web application framework
B. Prevent a DDoS attack
C. Encrypt their entire database
D. Stop a malicious insider from stealing data

38 An attacker obtains a database of hashed passwords from a breached website. To crack them offline, they use a pre-computed table of hash values for millions of potential passwords. What attack method is being used?

Password and brute-force attacks Medium
A. Credential Stuffing
B. Rainbow Table Attack
C. Dictionary Attack
D. Brute-Force Attack

39 A smart thermostat in a home is compromised and used as a pivot point to attack other devices on the home network, like laptops and phones. This scenario best illustrates the cybersecurity challenge posed by what modern trend?

Introduction to cybersecurity-definition, importance in digital era Medium
A. The adoption of cloud computing
B. The use of multi-factor authentication
C. The proliferation of the Internet of Things (IoT)
D. The rise of social media

40 A user visits a popular news website, which has been compromised by an attacker. Malicious code on the news site silently redirects the user's browser to another site, which then attempts to install malware on their computer. This type of attack is known as a:

secure web browsing Medium
A. Phishing Attack
B. Drive-by Download
C. Denial-of-Service (DoS) Attack
D. Cross-Site Scripting (XSS) Attack

41 A real-time financial trading platform prioritizes sub-millisecond transaction speeds to maintain a competitive edge. To achieve this, it employs an aggressive distributed caching mechanism that updates every 500 milliseconds. While this significantly enhances performance and uptime (Availability), it creates a brief window where traders might see stale, yet validly formatted, market data. In this scenario, which security principle is being intentionally de-prioritized in a trade-off, and what is the specific risk?

CIA Triad (Confidentiality, Integrity, Availability) Hard
A. Authenticity is de-prioritized, risking the execution of unauthorized trades.
B. Confidentiality is de-prioritized, risking the exposure of trading algorithms.
C. Integrity is de-prioritized, risking algorithmic trading decisions based on outdated information.
D. Availability is de-prioritized, risking system crashes due to cache coherency issues.

42 A security analyst runs an Nmap scan on a web server and receives the following partial output:

PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.29 ((Ubuntu))
2222/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3
8080/tcp open http-proxy Apache Tomcat/Coyote JSP engine 1.1

The analyst knows that Apache Struts 2 is used by one of the applications running on Tomcat. Based only on the version information provided, which service represents the most probable critical and remotely exploitable vulnerability that should be prioritized for immediate investigation?

Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems) Hard
A. The OpenSSH service on port 2222, because non-standard ports are often forgotten during patching cycles.
B. The Apache httpd service on port 80, as unencrypted traffic can be easily intercepted.
C. The Apache httpd service on port 443, as SSL implementations can have critical flaws like Heartbleed.
D. The Apache Tomcat service on port 8080, due to its common association with Java application vulnerabilities like those in older Struts versions.

43 A highly secure government network, protected by a state-of-the-art next-generation firewall, an EDR solution, and a policy of patching all systems within 24 hours of vendor patch release, was breached. The forensic investigation revealed that the initial entry point was a spear-phishing email with a malicious PDF attachment. The victim opened the PDF with a fully patched version of Adobe Acrobat Reader, which executed shellcode to establish a C2 channel. What is the most accurate classification of the vulnerability that was exploited?

Zero day attack Hard
A. A zero-day exploit.
B. A social engineering flaw in the user's judgment.
C. A known but unpatched vulnerability (N-day).
D. A configuration error in the EDR solution.

44 A US-based SaaS company provides a health and wellness application to customers globally, including in California and the European Union. The company collects personal identification, location data, and user-reported health metrics. In the event of a data breach affecting all users, which regulation imposes the most stringent (i.e., shortest) mandatory notification timeline to a supervisory authority, and what is that timeline?

Cybersecurity compliance Hard
A. HIPAA (Health Insurance Portability and Accountability Act), requiring notification without unreasonable delay and in no case later than 60 calendar days following the discovery.
B. SOX (Sarbanes-Oxley Act), which does not specify a breach notification timeline but requires disclosure of material events.
C. CCPA (California Consumer Privacy Act), requiring notification in the most expedient time possible and without unreasonable delay.
D. GDPR (General Data Protection Regulation), requiring notification within 72 hours of becoming aware of the breach.

45 A web application stores user password hashes using the bcrypt algorithm with a work factor of 12. An attacker manages to exfiltrate the entire password database, which includes the full hash strings (e.g., 12$...). The attacker possesses a massive pre-computed rainbow table for SHA-256 hashes of all 8-character passwords. How effective will this rainbow table be against the stolen bcrypt hashes?

Password and brute-force attacks Hard
A. Highly effective, because the rainbow table can be adapted to reverse the bcrypt hashing process.
B. Completely ineffective, because bcrypt incorporates a unique salt for each password before hashing, making pre-computed tables for a different algorithm useless.
C. Somewhat effective, as it can identify the algorithm used and narrow down the search space for a subsequent brute-force attack.
D. Ineffective for most hashes, but effective for any passwords that were not salted by the bcrypt implementation.

46 A web server suddenly becomes unresponsive to legitimate user requests. Network analysis shows that the server's TCP connection table is full. The connections are all in the SYN_RCVD state and originate from a wide range of spoofed IP addresses. The server's CPU and memory usage are nominal, but it cannot establish any new connections. Which specific type of DoS attack is this server experiencing?

Denial of Service (DoS) Hard
A. A Ping of Death attack.
B. An HTTP GET Flood (Layer 7) attack.
C. A TCP SYN Flood attack.
D. A UDP Flood attack.

47 A company's SIEM system flags a data exfiltration event. Approximately 5 GB of sensitive R&D schematics were uploaded to a private cloud storage service. The activity is traced to the workstation of a senior engineer with legitimate access to the data. The logs show the activity occurred during normal business hours using the engineer's own credentials, with no evidence of remote access software or malware. The engineer denies any knowledge of the transfer. Which of the following threat scenarios is the most difficult to definitively prove or disprove with the given information?

Cyber Threat Landscape: Insider vs External threats Hard
A. A malicious insider intentionally stealing data for personal gain or a competitor.
B. A sophisticated malware on the workstation that operates under the user's security context without their knowledge.
C. An external attacker who has compromised the engineer's credentials through phishing and is using a proxy within the company's geographical region to evade detection.
D. An unintentional data leak caused by a misconfigured backup script or synchronization tool run by the employee.

48 A malware variant infects a system and its primary payload is to modify the firmware of the system's hard drive controller. This modification persists even if the operating system is reinstalled or the drive is reformatted. The malware uses this persistent foothold to reinfect the operating system every time the machine boots. What is the most accurate classification for this type of malware?

Malwares Hard
A. A Bootkit.
B. A Rootkit.
C. A Polymorphic Virus.
D. A Fileless Malware.

49 A security analyst is reviewing a Wireshark packet capture from a network segment and observes a pattern: A host (192.168.1.10) sends an ARP request asking "Who has 192.168.1.1?". The gateway (MAC AA:...) responds "192.168.1.1 is at AA:...". Immediately after, another host (192.168.1.50) sends an unsolicited ARP reply to 192.168.1.10, falsely claiming "192.168.1.1 is at BB:...". The analyst then sees all subsequent traffic from 192.168.1.10 intended for the gateway being sent to MAC address BB:.... What attack is being observed?

Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems) Hard
A. DNS Spoofing.
B. MAC Flooding.
C. ARP Poisoning / ARP Spoofing.
D. IP Spoofing.

50 An organization deploys an advanced AI-based User and Entity Behavior Analytics (UEBA) system. The system builds a baseline of normal activity for each user. An attacker with stolen credentials for a privileged account wants to find and exfiltrate sensitive data without being detected. Which of the following strategies would be most effective at evading this specific type of AI defense?

AI-based threat detection systems Hard
A. Conducting a 'low-and-slow' attack, where actions are performed intermittently over a long period, closely mimicking the legitimate user's established access patterns and timings.
B. Using a zero-day exploit to disable the UEBA agent on the compromised machine.
C. Executing a 'smash-and-grab' attack, exfiltrating all data as quickly as possible before the system can respond.
D. Flooding the UEBA system with a large volume of fake log data to confuse its learning model.

51 A user enables browser synchronization on their desktop and mobile devices. They log into their browser account, and all bookmarks, history, saved passwords, and extensions are synchronized across devices via the browser vendor's cloud. From a threat modeling perspective, what is the primary consequence of this feature regarding the user's digital footprint and attack surface?

Personal data protection and digital footprints Hard
A. It reduces the attack surface by ensuring security settings and patches are consistent across all devices.
B. It anonymizes their digital footprint by mixing their browsing data with that of other users in the vendor's cloud.
C. It encrypts the digital footprint, making it more secure than if it were stored locally on an unencrypted hard drive.
D. It centralizes disparate parts of their digital footprint into a single, high-value target (the browser account), where a single credential compromise can expose their entire cross-device browsing life.

52 An attacker crafts a spear-phishing email targeting a company's CEO. The email spoofs the identity of the company's legal counsel and urgently requests the CEO to wire funds for a confidential, time-sensitive corporate acquisition. The email stresses secrecy and warns against discussing the matter with anyone, including the CFO. This attack, known as Business Email Compromise (BEC), primarily leverages which two social engineering principles for maximum effect?

Phishing and Social Engineering attacks Hard
A. Intimidation and Familiarity.
B. Authority and Scarcity/Urgency.
C. Social Proof and Liking.
D. Consistency and Reciprocity.

53 The 2020 SolarWinds (SUNBURST) attack was a landmark cybersecurity event. Instead of directly attacking target organizations, the threat actors compromised the software development process of a trusted vendor, SolarWinds. They inserted a malicious backdoor into the Orion Platform software, which was then digitally signed and distributed to thousands of customers via the legitimate update process. What is the most accurate term for this attack vector?

Case study of recent cyber incidents Hard
A. A man-in-the-middle attack.
B. A watering hole attack.
C. A zero-day exploit.
D. A software supply chain attack.

54 A cybersecurity team is conducting a 'Purple Team' exercise. One group is responsible for emulating attacker Tactics, Techniques, and Procedures (TTPs) to exploit vulnerabilities and achieve specific objectives within the network. The other group is responsible for monitoring detection systems in real-time, analyzing the emulated attack's signatures, and tuning security controls (like EDR and SIEM rules) to improve detection and response for those specific TTPs. Which job roles best represent the attacking and defending groups, respectively?

Job roles and skill sets for cybersecurity Hard
A. Penetration Testers (attackers) and Security Architects (defenders).
B. Ethical Hackers (attackers) and Compliance Auditors (defenders).
C. Threat Hunters (attackers) and Incident Responders (defenders).
D. Red Team (attackers) and Blue Team (defenders).

55 A system must defend against both online and offline password guessing attacks. Which of the following combinations of controls provides the strongest defense against both threat types?

Password and brute-force attacks Hard
A. Server-side: Storing passwords in an encrypted database. Client-side: A strong password complexity policy (e.g., 12+ characters, mixed types).
B. Server-side: Hashing passwords with a global 'pepper' in addition to a salt. Client-side: CAPTCHA after failed login attempts.
C. Server-side: Use of a modern, slow hashing algorithm with a unique salt (e.g., Argon2). Client-side: Strict account lockout policies after a few failed attempts.
D. Server-side: Use of a fast hashing algorithm (e.g., SHA-256) for performance. Client-side: Multi-Factor Authentication (MFA).

56 You are visiting a website using HTTPS, and your browser displays a padlock icon. You click the padlock and see the connection is encrypted with TLS 1.3, and the certificate was issued to 'example.com' by a trusted Certificate Authority (CA). Which of the following threats is not mitigated by these specific TLS/HTTPS protections?

Secure web browsing Hard
A. An attacker using a packet sniffer to capture your session cookie on a public Wi-Fi network.
B. An attacker modifying the data (e.g., changing a transaction amount) while it is in transit between your browser and the server.
C. A man-in-the-middle attacker on your local network intercepting and reading the data you send to the server.
D. The website you are visiting is a phishing site perfectly mimicking the real 'example.com', but hosted on a different domain ('examp1e.com') that has its own valid TLS certificate.

57 An attacker sends an email to a user with a link that appears legitimate. When the user clicks the link, they are taken to the real, legitimate website (e.g., their bank). However, the link was specially crafted to include a script that executes on the legitimate site, causing the user's browser to perform an unintended action, such as changing their password or transferring money. The user was already logged into their bank account in another tab. What is this attack called?

Social media and email security Hard
A. Session Hijacking.
B. Cross-Site Scripting (XSS).
C. Clickjacking.
D. Cross-Site Request Forgery (CSRF).

58 A new strain of malware is discovered that does not write any executable files to the disk. Instead, its components are loaded directly from the network into the system's memory and executed using legitimate, built-in system tools like PowerShell and WMI (Windows Management Instrumentation). This technique makes it very difficult for traditional, signature-based antivirus solutions to detect. What is this category of malware known as?

Malware-based attacks Hard
A. Polymorphic Malware.
B. Fileless Malware.
C. A Logic Bomb.
D. Metamorphic Malware.

59 A company is undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit. The auditor finds that while the company encrypts all credit card numbers (PANs) in their database using AES-256, the encryption keys are stored in a configuration file on the same database server. Which specific security principle has been violated, and why does this fail compliance?

Cybersecurity compliance Hard
A. Defense in depth. There is only a single layer of security (encryption) protecting the data.
B. The principle of data minimization. The company should not be storing credit card numbers at all.
C. Separation of duties and key management principles. Storing keys with the data they protect renders the encryption ineffective if the server is compromised.
D. The principle of least privilege. The database process has access to both data and keys.

60 The concept of 'Cyber Resilience' extends beyond traditional cybersecurity. While traditional cybersecurity focuses primarily on preventing and detecting attacks, what is the core emphasis of cyber resilience that distinguishes it?

Introduction to cybersecurity-definition, importance in digital era Hard
A. The ability of an organization to continue its mission-critical operations and recover quickly even when a cyber attack is successful.
B. The use of AI and machine learning to predict and preemptively block all future cyber attacks before they are launched.
C. The focus on achieving 100% compliance with all relevant cybersecurity regulations and standards.
D. The ability to create a perfectly impenetrable network perimeter that is immune to all forms of cyber attack.