SmartAssess.io
Login
? Back to Cybersecurity
Intermediate ~5 min

Cyber Security Advanced

This introductory assessment covers fundamental cybersecurity concepts, including common threats, basic network security, authentication, data protection, and safe online practices. Designed for beginners and non-technical users, the test focuses on understanding core security principles and recognizing risks in everyday digital environments.

Progress: 0/30
Intermediate • ~5 min
Q1. What is a zero-day exploit?
Select one answer • 1 pt
Q2. What does AES stand for in cryptography?
Select one answer • 1 pt
Q3. Which attack involves injecting malicious code into a website?
Select one answer • 1 pt
Q4. What is a man-in-the-middle (MITM) attack?
Select one answer • 1 pt
Q5. What is the purpose of a digital certificate?
Select one answer • 1 pt
Q6. Which protocol is used for secure email transmission?
Select one answer • 1 pt
Q7. What is SQL injection?
Select one answer • 1 pt
Q8. What does PKI stand for?
Select one answer • 1 pt
Q9. Which is an example of a rootkit?
Select one answer • 1 pt
Q10. What is cross-site request forgery (CSRF)?
Select one answer • 1 pt
Q11. What is the role of a honeypot in security?
Select one answer • 1 pt
Q12. Which hashing algorithm is considered secure for passwords?
Select one answer • 1 pt
Q13. What is ARP poisoning?
Select one answer • 1 pt
Q14. What does GDPR regulate?
Select one answer • 1 pt
Q15. Which attack uses multiple compromised systems?
Select one answer • 1 pt
Q16. What is multi-factor authentication (MFA)?
Select one answer • 1 pt
Q17. What is a buffer overflow attack?
Select one answer • 1 pt
Q18. Which framework is used for incident response?
Select one answer • 1 pt
Q19. What is OAuth used for?
Select one answer • 1 pt
Q20. What does IDS stand for?
Select one answer • 1 pt
Q21. Which is a characteristic of asymmetric encryption?
Select one answer • 1 pt
Q22. What is a supply chain attack?
Select one answer • 1 pt
Q23. What does SIEM stand for?
Select one answer • 1 pt
Q24. Which tool is used for penetration testing?
Select one answer • 1 pt
Q25. What is zero trust architecture?
Select one answer • 1 pt
Q26. What is a cryptographic nonce?
Select one answer • 1 pt
Q27. Which attack exploits DNS vulnerabilities?
Select one answer • 1 pt
Q28. What is forensic analysis in cybersecurity?
Select one answer • 1 pt
Q29. What does HIPAA protect?
Select one answer • 1 pt
Q30. Which is an advanced persistent threat (APT)?
Select one answer • 1 pt
Cancel