Categories
Tests
About
Hello, Guest
Login
Open menu
Categories
Tests
About
Login
? Back to Cybersecurity
Beginner
~5 min
Cyber Security Basics
Test your basic cyber security knowledge.
Progress:
0
/25
Beginner • ~5 min
Q1. What is cybersecurity?
Select one answer • 1 pt
Writing computer programs
Protecting systems networks and data
Building hardware
Managing social media
Q2. What does CIA stand for in cybersecurity?
Select one answer • 1 pt
Central Intelligence Agency
Confidentiality Integrity Availability
Certified Internet Authority
Control Information Access
Q3. Which is an example of malware?
Select one answer • 1 pt
Antivirus
Patch
Firewall
Trojan Horse
Q4. What is phishing?
Select one answer • 1 pt
Attempting to trick users into revealing info
Blocking spam emails
Encrypting files
Network monitoring
Q5. Which password is strongest?
Select one answer • 1 pt
Welcome1
password123
9f!Kq#2Lm@A
P@55w0rd
Q6. What is two-factor authentication?
Select one answer • 1 pt
Two usernames
Two passwords
Logging in twice
A password plus another verification step
Q7. Which is a social engineering attack?
Select one answer • 1 pt
DDoS attack
SQL injection
Phishing email
Brute force login
Q8. What does a firewall do?
Select one answer • 1 pt
Monitors employees
Filters network traffic
Encrypts data
Backs up files
Q9. What is malware designed to do?
Select one answer • 1 pt
Update software
Improve performance
Protect systems
Cause harm or unauthorized actions
Q10. Which is a secure practice?
Select one answer • 1 pt
Sharing credentials
Disabling updates
Reusing passwords
Regular software patching
Q11. What is encryption?
Select one answer • 1 pt
Converting data into unreadable form
Copying data
Deleting data
Compressing files
Q12. What is a vulnerability?
Select one answer • 1 pt
A firewall rule
A secure setting
An antivirus scan
A system weakness
Q13. What does HTTPS provide?
Select one answer • 1 pt
Free hosting
Faster browsing
Encrypted communication
Anonymous access
Q14. Which attack floods a system with traffic?
Select one answer • 1 pt
Keylogging
Phishing
Man in the middle
DDoS
Q15. What is least privilege?
Select one answer • 1 pt
Disabled authentication
Users get minimum access needed
Shared accounts
All users get admin access
Q16. Which is personal data?
Select one answer • 1 pt
Social Security number
Source code
IP address only
CPU model
Q17. What is ransomware?
Select one answer • 1 pt
Firewall type
Backup software
Password manager
Malware that encrypts files for payment
Q18. Why are updates important?
Select one answer • 1 pt
They remove features
They add ads
They slow systems
They fix security flaws
Q19. What is a secure Wi-Fi practice?
Select one answer • 1 pt
WPA2 or WPA3 encryption
Public sharing
Weak password
Open network
Q20. What does antivirus software do?
Select one answer • 1 pt
Blocks all traffic
Encrypts networks
Detects and removes malware
Creates passwords
Q21. What is a data breach?
Select one answer • 1 pt
System shutdown
Unauthorized data access
Network upgrade
Maintenance window
Q22. Which is a phishing sign?
Select one answer • 1 pt
Known sender
Proper grammar
Encrypted email
Urgent message asking for info
Q23. What are backups used for?
Select one answer • 1 pt
Speed improvement
Access control
Data recovery
Malware removal
Q24. What is a strong security habit?
Select one answer • 1 pt
Ignoring alerts
Verifying email senders
Clicking unknown links
Sharing passwords
Q25. What is the main goal of cybersecurity?
Select one answer • 1 pt
Eliminate all risk
Protect digital assets
Stop internet usage
Make systems complex
Cancel
Submit answers