• Tutorials
  • Courses
  • Tracks

Cyber Quiz 1

Last Updated :
Discuss
Comments

Question 1

What are the three core principles of cybersecurity?

  • Access, Backup, Monitoring

  • Integrity, Flexibility, Access

  • Confidentiality, Integrity, Availability

  • Encryption, Detection, Erasure

Question 2

Why were most organizations highly vulnerable before cybersecurity became mainstream?

  • Because they used Windows OS

  • Due to lack of encryption, patching, and endpoint protection

  • Because they stored data on USBs

  • They allowed guest WiFi access

Question 3

What was the key outcome of the 1988 Morris Worm incident?

  • The first firewall was invented

  • 90% of the internet went offline

  • Email was banned in the U.S. temporarily

  • It highlighted the need for network security and response teams

Question 4

What major lesson did the 1994 Citibank Heist teach the banking sector?

  • Stop using dial-up internet

  • Employ stronger access controls and multi-factor authentication

  • Ban Russian users

  • Shift from digital banking to physical

Question 5

Which of the following is NOT a typical result of a DDoS attack?

  • Service disruption

  • Slowed performance

  • Unauthorized database access

  • Website crashing

Question 6

What role is primarily responsible for detecting weak spots and planning defenses before an attack?

  • Malware Analyst

  • Penetration Tester

  • Security Analyst

  • Incident Responder

Question 7

What differentiates a Red Teamer from a typical Penetration Tester?

  • Red Teamers only scan for viruses

  • Penetration testers use only manual tools

  • Red Teamers work only on cloud security

  • Red Teamers aim to simulate real-life attackers and avoid detection

Question 8

Which role focuses on investigating and analyzing harmful software like viruses and trojans?

  • Penetration Tester

  • Digital Forensics Examiner

  • Malware Analyst

  • SIEM Engineer

Question 9

What is one key skill required for Digital Forensics roles?

  • Building firewalls

  • Recovering deleted files using legal methods

  • Writing code for antivirus

  • Configuring cloud backups

Question 10

Which technology is increasingly used in 2025 to detect threats in real-time and reduce manual load?

  • CAPTCHA

  • Blockchain

  • Artificial Intelligence

  • MAC Address Filtering

There are 10 questions to complete.

Take a part in the ongoing discussion