
Cyber Security Basics
Authored by Shashwot Shahi
Information Technology (IT)
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the relationship between confidentiality, integrity, and availability in the CIA triad?
Confidentiality ensures data is accessible only to authorized users; integrity ensures data is unaltered; availability guarantees timely access to data.
Confidentiality ensures data is unaltered; integrity ensures data is accessible; availability guarantees data is encrypted.
Confidentiality guarantees timely access; integrity ensures data is encrypted; availability restricts access to authorized users.
Confidentiality and integrity both guarantee data availability.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of malware propagation, how does a worm differ from a virus in terms of its infection mechanism?
Worms require user interaction to spread, viruses spread autonomously.
Worms self-replicate and spread over networks without a host file, viruses attach to executable files and require user action.
Viruses spread through network vulnerabilities, worms attach to files.
Worms encrypt files, viruses delete files.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ransomware attack typically involves which of the following stages?
Data exfiltration, encryption, ransom demand, and decryption key delivery upon payment.
Immediate deletion of all user files.
Silent monitoring of user activity without file encryption.
Only stealing user credentials without file manipulation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios best exemplifies a man-in-the-middle (MITM) attack?
An attacker intercepts and alters communication between a user and a bank website without either party's knowledge.
An attacker floods a server with traffic to cause denial of service.
An attacker sends phishing emails to steal credentials.
An attacker exploits a buffer overflow vulnerability to gain access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does the implementation of HTTPS using SSL/TLS protocols protect against eavesdropping and tampering?
By encrypting data in transit and authenticating the server to the client.
By blocking all incoming traffic except from trusted IPs.
By scanning for malware at the network perimeter.
By storing passwords in encrypted form on the server.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the role of patch management in an organization's cybersecurity posture?
It ensures all software is updated regularly to mitigate known vulnerabilities and reduce attack surface.
It backs up data to prevent loss during attacks.
It monitors network traffic for suspicious activity.
It encrypts sensitive data at rest.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following social engineering techniques involves an attacker impersonating a trusted authority to extract information?
Phishing
Pretexting
Tailgating
Spear phishing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
38 questions
Quiz sur Apollo GraphQL
Quiz
•
University
40 questions
40 новый
Quiz
•
University
40 questions
Communication and Literacy Quiz
Quiz
•
12th Grade - University
45 questions
IT2112 Networking 1 Quiz 1
Quiz
•
University
43 questions
MGMT 2080 - Exam 2
Quiz
•
University
41 questions
JABA!
Quiz
•
University
40 questions
Summative Quiz : Introduction to Platform Technologies
Quiz
•
University
40 questions
Quiz 2_BDT_1&3_2025
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
5 questions
Helping Build the Internet: Valerie Thomas | Great Minds
Interactive video
•
11th Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
19 questions
Review2-TEACHER
Quiz
•
University
15 questions
Pre2_STUDENT
Quiz
•
University
20 questions
Ch. 7 Quadrilateral Quiz Review
Quiz
•
KG - University