Categories
Tests
About
Hello, Guest
Login
Open menu
Categories
Tests
About
Login
? Back to Cybersecurity
Beginner
~5 min
Cyber Security Basics
Test your basic cyber security knowledge.
Progress:
0
/25
Beginner • ~5 min
Q1. What is cybersecurity?
Select one answer • 1 pt
Protecting systems networks and data
Managing social media
Writing computer programs
Building hardware
Q2. What does CIA stand for in cybersecurity?
Select one answer • 1 pt
Certified Internet Authority
Confidentiality Integrity Availability
Central Intelligence Agency
Control Information Access
Q3. Which is an example of malware?
Select one answer • 1 pt
Patch
Antivirus
Trojan Horse
Firewall
Q4. What is phishing?
Select one answer • 1 pt
Blocking spam emails
Attempting to trick users into revealing info
Encrypting files
Network monitoring
Q5. Which password is strongest?
Select one answer • 1 pt
password123
9f!Kq#2Lm@A
Welcome1
P@55w0rd
Q6. What is two-factor authentication?
Select one answer • 1 pt
Two usernames
A password plus another verification step
Logging in twice
Two passwords
Q7. Which is a social engineering attack?
Select one answer • 1 pt
DDoS attack
SQL injection
Phishing email
Brute force login
Q8. What does a firewall do?
Select one answer • 1 pt
Encrypts data
Backs up files
Filters network traffic
Monitors employees
Q9. What is malware designed to do?
Select one answer • 1 pt
Cause harm or unauthorized actions
Improve performance
Update software
Protect systems
Q10. Which is a secure practice?
Select one answer • 1 pt
Sharing credentials
Reusing passwords
Regular software patching
Disabling updates
Q11. What is encryption?
Select one answer • 1 pt
Compressing files
Copying data
Deleting data
Converting data into unreadable form
Q12. What is a vulnerability?
Select one answer • 1 pt
A system weakness
A secure setting
An antivirus scan
A firewall rule
Q13. What does HTTPS provide?
Select one answer • 1 pt
Free hosting
Anonymous access
Encrypted communication
Faster browsing
Q14. Which attack floods a system with traffic?
Select one answer • 1 pt
Phishing
Keylogging
DDoS
Man in the middle
Q15. What is least privilege?
Select one answer • 1 pt
Shared accounts
Users get minimum access needed
All users get admin access
Disabled authentication
Q16. Which is personal data?
Select one answer • 1 pt
IP address only
CPU model
Social Security number
Source code
Q17. What is ransomware?
Select one answer • 1 pt
Malware that encrypts files for payment
Backup software
Password manager
Firewall type
Q18. Why are updates important?
Select one answer • 1 pt
They remove features
They add ads
They slow systems
They fix security flaws
Q19. What is a secure Wi-Fi practice?
Select one answer • 1 pt
Public sharing
WPA2 or WPA3 encryption
Weak password
Open network
Q20. What does antivirus software do?
Select one answer • 1 pt
Creates passwords
Encrypts networks
Detects and removes malware
Blocks all traffic
Q21. What is a data breach?
Select one answer • 1 pt
Maintenance window
Unauthorized data access
Network upgrade
System shutdown
Q22. Which is a phishing sign?
Select one answer • 1 pt
Urgent message asking for info
Proper grammar
Encrypted email
Known sender
Q23. What are backups used for?
Select one answer • 1 pt
Speed improvement
Malware removal
Data recovery
Access control
Q24. What is a strong security habit?
Select one answer • 1 pt
Verifying email senders
Clicking unknown links
Ignoring alerts
Sharing passwords
Q25. What is the main goal of cybersecurity?
Select one answer • 1 pt
Make systems complex
Eliminate all risk
Stop internet usage
Protect digital assets
Cancel
Submit answers