NEOCODE

Cybersecurity Fundamentals Quiz

Introduction to Cybersecurity

1. What is the primary goal of cybersecurity?

Correct Answer: a) To protect internet-connected systems from digital attacks

Cybersecurity aims to protect systems, networks, and data from digital attacks, unauthorized access, and damage.

2. Which of these is a core principle of information security (CIA triad)?

Correct Answer: b) Confidentiality, Integrity, Availability

The CIA triad represents the three fundamental principles of information security: keeping data private (Confidentiality), ensuring data accuracy (Integrity), and ensuring systems are accessible (Availability).

Cybersecurity Threats

3. What is the most common delivery method for ransomware?

Correct Answer: a) Phishing emails

Ransomware is most commonly delivered through phishing emails containing malicious attachments or links that install the malware when clicked.

4. Which of these is NOT a type of malware?

Correct Answer: d) Firewall

A firewall is a security device that monitors and controls network traffic, not a type of malware. Viruses, worms, and Trojans are all malicious software types.

Types of Attacks

5. What is a DDoS attack?

Correct Answer: a) Overwhelming a system with traffic from multiple sources

A Distributed Denial of Service (DDoS) attack floods a target with traffic from many compromised devices to make it unavailable to users.

6. What is the main characteristic of a zero-day exploit?

Correct Answer: a) It targets a vulnerability before a fix is available

A zero-day exploit takes advantage of a software vulnerability that is unknown to the vendor, giving them "zero days" to fix it before attacks occur.

7. Which attack involves intercepting communication between two parties?

Correct Answer: b) Man-in-the-middle attack

In a MITM attack, the attacker secretly intercepts and possibly alters communications between two parties who believe they are directly communicating.

8. What is the primary purpose of spyware?

Correct Answer: b) To secretly gather information about a user

Spyware is designed to collect data about a user's activities without their knowledge, often including sensitive information like passwords and credit card numbers.

9. Which of these is a social engineering attack?

Correct Answer: a) Phishing

Phishing is a social engineering attack where attackers impersonate legitimate entities to trick users into revealing sensitive information.

10. What does multi-factor authentication (MFA) help protect against?

Correct Answer: a) Credential theft and unauthorized access

MFA adds additional verification steps beyond just a password, making it harder for attackers to gain access even if they steal credentials.