Unit 3 - Practice Quiz

CSE121 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 What is the primary objective of Cybersecurity?

A. To increase internet speed
B. To protect systems, networks, and programs from digital attacks
C. To generate data for marketing
D. To monitor employee productivity

2 Which of the following components make up the CIA Triad in information security?

A. Control, Intelligence, Authentication
B. Computer, Internet, Access
C. Confidentiality, Integrity, Availability
D. Cipher, Identity, Authorization

3 Ensuring that data is not altered or tampered with by unauthorized entities refers to which element of the CIA Triad?

A. Confidentiality
B. Integrity
C. Availability
D. Authentication

4 If a website is taken down by a hacker and becomes inaccessible to users, which aspect of the CIA Triad is violated?

A. Confidentiality
B. Integrity
C. Availability
D. Non-repudiation

5 Which of the following best describes an Insider Threat?

A. A hacker from another country attacking a database
B. A malware infection from a phishing email
C. A current or former employee misusing their access privileges
D. A zero-day exploit found in software

6 What is Malware?

A. Hardware designed to secure data
B. Software designed to disrupt, damage, or gain unauthorized access
C. A person who fixes computer bugs
D. A type of network cable

7 Which type of malware disguises itself as legitimate software to trick users into installing it?

A. Worm
B. Trojan Horse
C. Adware
D. Ransomware

8 What distinguishes a Worm from a Virus?

A. A worm requires a host file to spread
B. A worm encrypts files
C. A worm can replicate itself without human interaction
D. A worm is only found on mobile devices

9 Which attack involves an attacker sending fraudulent emails claiming to be from a reputable company to induce individuals to reveal personal information?

A. Phishing
B. DDoS
C. SQL Injection
D. Man-in-the-Middle

10 What is Spear Phishing?

A. Phishing meant for the general public
B. A targeted phishing attempt aimed at a specific individual or organization
C. Phishing done via voice calls
D. Phishing done via SMS

11 In the context of Social Engineering, what is Pretexting?

A. Following someone into a secure area
B. Creating a fabricated scenario to obtain information
C. Looking over someone's shoulder to see their password
D. Searching through trash for documents

12 Which type of attack attempts to guess a password by trying every possible combination of characters?

A. Phishing
B. Brute-force attack
C. SQL Injection
D. Cross-Site Scripting

13 What is a Dictionary Attack?

A. Attacking a physical library
B. Using a list of common words and phrases to guess passwords
C. Intercepting network traffic
D. Overloading a server with requests

14 What does DoS stand for in cybersecurity?

A. Disk Operating System
B. Denial of Service
C. Data over Security
D. Digital output Signal

15 How does a DDoS (Distributed Denial of Service) attack differ from a standard DoS attack?

A. It uses a single computer to attack
B. It targets data integrity instead of availability
C. It uses a network of multiple infected devices (botnet) to attack
D. It is slower than a DoS attack

16 What is a Zero-day attack?

A. An attack that takes 0 days to execute
B. An attack that exploits a vulnerability unknown to the software vendor
C. An attack that occurs at midnight
D. An attack aimed at resetting a system to day zero

17 Which type of malware encrypts a victim's files and demands payment for the decryption key?

A. Spyware
B. Ransomware
C. Adware
D. Rootkit

18 The WannaCry incident in 2017 is a famous example of which type of cyber attack?

A. Phishing campaign
B. Ransomware attack
C. DDoS attack
D. SQL Injection

19 What is a Digital Footprint?

A. The physical weight of a computer
B. The trail of data you create while using the Internet
C. A security tool for tracking hackers
D. A biometric scanning method

20 Which of the following creates a Passive Digital Footprint?

A. Posting on social media
B. Sending an email
C. Websites collecting your IP address without your direct action
D. Filling out an online form

21 When browsing the web, what does the 'S' in HTTPS stand for?

A. Speed
B. Secure
C. System
D. Standard

22 Which symbol in the browser address bar indicates a secure connection?

A. A warning triangle
B. A padlock icon
C. A red shield
D. A magnifying glass

23 What is Two-Factor Authentication (2FA)?

A. Using two different passwords
B. Requiring two people to log in
C. Using two distinct forms of identification to access an account
D. Changing your password twice a year

24 Which of the following is a recommended practice for Password Security?

A. Using the same password for all accounts
B. Writing passwords on a sticky note
C. Using a complex mix of characters, numbers, and symbols
D. Sharing passwords with colleagues

25 What is Nmap primarily used for?

A. Editing text files
B. Network discovery and security auditing
C. Creating 3D graphics
D. Playing music

26 Which tool is widely used for Packet Analysis and capturing network traffic?

A. Photoshop
B. Wireshark
C. Excel
D. Nmap

27 How do AI-based threat detection systems improve cybersecurity?

A. By physically locking server rooms
B. By replacing all human analysts
C. By analyzing patterns and anomalies to predict/detect unknown threats
D. By slowing down internet traffic

28 What is Social Media Security primarily concerned with?

A. Getting more likes
B. Protecting personal information and account integrity on social platforms
C. Designing better profile pictures
D. Analyzing marketing trends

29 Which of the following is an example of Vishing?

A. A fake email asking for passwords
B. A phone call scam pretending to be the bank
C. A text message with a malicious link
D. A physical break-in

30 What is Smishing?

A. Phishing via SMS/Text messages
B. Phishing via small emails
C. Social engineering via social media
D. Malware for smartwatches

31 In the context of data protection, what does GDPR stand for?

A. Global Data Processing Rule
B. General Data Protection Regulation
C. General Digital Protocol Rule
D. Great Data Privacy Right

32 Which job role is responsible for overseeing an organization's entire security posture?

A. Web Developer
B. CISO (Chief Information Security Officer)
C. Data Entry Clerk
D. Graphic Designer

33 What is a Penetration Tester (Ethical Hacker)?

A. A criminal who steals data
B. A professional hired to legally hack systems to find vulnerabilities
C. A software developer
D. A network administrator

34 What is a Keylogger?

A. A tool to organize physical keys
B. Spyware that records keystrokes to steal passwords and data
C. A secure password manager
D. A type of antivirus

35 Using public Wi-Fi without a VPN exposes you to which risk?

A. Higher data usage costs
B. Man-in-the-Middle (MitM) attacks
C. Hardware failure
D. Software incompatibility

36 Which tool is commonly associated with the Metasploit Framework?

A. Spreadsheet calculation
B. Exploit development and penetration testing
C. Video editing
D. Database management

37 What is the primary function of a Firewall?

A. To cool down the computer
B. To monitor and control incoming and outgoing network traffic
C. To speed up the internet
D. To store passwords

38 Which compliance standard is specifically for the payment card industry?

A. HIPAA
B. GDPR
C. PCI DSS
D. ISO 27001

39 What is Baiting in social engineering?

A. Leaving a physical infected device (like a USB) for a victim to find
B. Sending an email with a bait link
C. Calling a victim
D. Hacking a server directly

40 Which skill is NOT typically required for a cybersecurity professional?

A. Understanding of networking protocols
B. Knowledge of operating systems
C. Advanced 3D Animation
D. Problem-solving and analytical skills

41 What is a Logic Bomb?

A. A physical explosive
B. Malicious code that activates when specific criteria are met
C. A logical error in code
D. A tool to defuse viruses

42 In a SQL Injection attack, what does the attacker inject?

A. A virus
B. Malicious SQL queries/code into inputs
C. A worm
D. HTML code

43 What is the concept of Non-Repudiation?

A. Hiding your identity
B. Ensuring a party cannot deny the authenticity of their signature/message
C. Encrypting data
D. Backing up data

44 Which of the following creates a strong password mathematically? ( = character set size, = length)

A. Increasing only
B. Increasing significantly increases complexity ()
C. Decreasing
D. Using only lowercase letters

45 What is the main purpose of a SOC (Security Operations Center)?

A. To sell software
B. To house the servers
C. To monitor, detect, and respond to cyber threats 24/7
D. To develop websites

46 Which recent supply chain attack compromised the software updates of a major IT management company?

A. SolarWinds Hack
B. WannaCry
C. Stuxnet
D. ILOVEYOU

47 What is Spyware?

A. Software that speeds up the PC
B. Software intended to spy on the user and collect data without consent
C. Software used by spies to communicate
D. Antivirus software

48 To secure email, which of the following should you avoid?

A. Using strong passwords
B. Clicking on unsolicited links or attachments
C. Using 2FA
D. Checking the sender's address carefully

49 What is a Botnet?

A. A robot network
B. A network of private computers infected with malicious software and controlled as a group
C. A network for trading bots
D. A fast internet connection

50 Which cybersecurity role focuses on forensic investigation after a breach?

A. Penetration Tester
B. Digital Forensics Analyst
C. Network Engineer
D. Sales Manager