Question 1
What are the three core principles of cybersecurity?
Access, Backup, Monitoring
Integrity, Flexibility, Access
Confidentiality, Integrity, Availability
Encryption, Detection, Erasure
Question 2
Why were most organizations highly vulnerable before cybersecurity became mainstream?
Because they used Windows OS
Due to lack of encryption, patching, and endpoint protection
Because they stored data on USBs
They allowed guest WiFi access
Question 3
What was the key outcome of the 1988 Morris Worm incident?
The first firewall was invented
90% of the internet went offline
Email was banned in the U.S. temporarily
It highlighted the need for network security and response teams
Question 4
What major lesson did the 1994 Citibank Heist teach the banking sector?
Stop using dial-up internet
Employ stronger access controls and multi-factor authentication
Ban Russian users
Shift from digital banking to physical
Question 5
Which of the following is NOT a typical result of a DDoS attack?
Service disruption
Slowed performance
Unauthorized database access
Website crashing
Question 6
What role is primarily responsible for detecting weak spots and planning defenses before an attack?
Malware Analyst
Penetration Tester
Security Analyst
Incident Responder
Question 7
What differentiates a Red Teamer from a typical Penetration Tester?
Red Teamers only scan for viruses
Penetration testers use only manual tools
Red Teamers work only on cloud security
Red Teamers aim to simulate real-life attackers and avoid detection
Question 8
Which role focuses on investigating and analyzing harmful software like viruses and trojans?
Penetration Tester
Digital Forensics Examiner
Malware Analyst
SIEM Engineer
Question 9
What is one key skill required for Digital Forensics roles?
Building firewalls
Recovering deleted files using legal methods
Writing code for antivirus
Configuring cloud backups
Question 10
Which technology is increasingly used in 2025 to detect threats in real-time and reduce manual load?
CAPTCHA
Blockchain
Artificial Intelligence
MAC Address Filtering
There are 10 questions to complete.