Categories
Tests
About
Hello, Guest
Login
Open menu
Categories
Tests
About
Login
? Back to Cybersecurity
Beginner
~5 min
Cyber Security Basics
Test your basic cyber security knowledge.
Progress:
0
/25
Beginner • ~5 min
Q1. What is cybersecurity?
Select one answer • 1 pt
Writing computer programs
Building hardware
Protecting systems networks and data
Managing social media
Q2. What does CIA stand for in cybersecurity?
Select one answer • 1 pt
Certified Internet Authority
Confidentiality Integrity Availability
Central Intelligence Agency
Control Information Access
Q3. Which is an example of malware?
Select one answer • 1 pt
Patch
Firewall
Antivirus
Trojan Horse
Q4. What is phishing?
Select one answer • 1 pt
Attempting to trick users into revealing info
Encrypting files
Blocking spam emails
Network monitoring
Q5. Which password is strongest?
Select one answer • 1 pt
password123
P@55w0rd
Welcome1
9f!Kq#2Lm@A
Q6. What is two-factor authentication?
Select one answer • 1 pt
Two passwords
Two usernames
Logging in twice
A password plus another verification step
Q7. Which is a social engineering attack?
Select one answer • 1 pt
Phishing email
SQL injection
Brute force login
DDoS attack
Q8. What does a firewall do?
Select one answer • 1 pt
Backs up files
Monitors employees
Filters network traffic
Encrypts data
Q9. What is malware designed to do?
Select one answer • 1 pt
Cause harm or unauthorized actions
Update software
Protect systems
Improve performance
Q10. Which is a secure practice?
Select one answer • 1 pt
Disabling updates
Regular software patching
Sharing credentials
Reusing passwords
Q11. What is encryption?
Select one answer • 1 pt
Copying data
Converting data into unreadable form
Deleting data
Compressing files
Q12. What is a vulnerability?
Select one answer • 1 pt
A firewall rule
An antivirus scan
A secure setting
A system weakness
Q13. What does HTTPS provide?
Select one answer • 1 pt
Free hosting
Anonymous access
Faster browsing
Encrypted communication
Q14. Which attack floods a system with traffic?
Select one answer • 1 pt
Phishing
Keylogging
DDoS
Man in the middle
Q15. What is least privilege?
Select one answer • 1 pt
Shared accounts
All users get admin access
Disabled authentication
Users get minimum access needed
Q16. Which is personal data?
Select one answer • 1 pt
Source code
CPU model
Social Security number
IP address only
Q17. What is ransomware?
Select one answer • 1 pt
Malware that encrypts files for payment
Firewall type
Password manager
Backup software
Q18. Why are updates important?
Select one answer • 1 pt
They add ads
They slow systems
They remove features
They fix security flaws
Q19. What is a secure Wi-Fi practice?
Select one answer • 1 pt
Open network
Public sharing
WPA2 or WPA3 encryption
Weak password
Q20. What does antivirus software do?
Select one answer • 1 pt
Encrypts networks
Blocks all traffic
Detects and removes malware
Creates passwords
Q21. What is a data breach?
Select one answer • 1 pt
Maintenance window
Unauthorized data access
Network upgrade
System shutdown
Q22. Which is a phishing sign?
Select one answer • 1 pt
Encrypted email
Urgent message asking for info
Proper grammar
Known sender
Q23. What are backups used for?
Select one answer • 1 pt
Speed improvement
Malware removal
Data recovery
Access control
Q24. What is a strong security habit?
Select one answer • 1 pt
Clicking unknown links
Ignoring alerts
Sharing passwords
Verifying email senders
Q25. What is the main goal of cybersecurity?
Select one answer • 1 pt
Eliminate all risk
Make systems complex
Stop internet usage
Protect digital assets
Cancel
Submit answers