Cyber Security Quiz

Welcome to The Coding College Cyber Security Quiz! Whether you’re a beginner or a seasoned professional, this quiz will challenge your knowledge of essential concepts, tools, and techniques.

Instructions

  • This quiz consists of 15 multiple-choice questions.
  • Select the correct answer for each question.
  • Answers are provided at the end of the quiz.

The Quiz

1. What is the primary goal of cyber security?

A. To manage IT infrastructure
B. To monitor online activity
C. To protect systems, networks, and data from cyber threats
D. To ensure legal compliance

2. Which of the following is an example of a phishing attack?

A. Encrypting files for ransom
B. Sending fraudulent emails to steal credentials
C. Infecting a system with a virus
D. Overloading a system with traffic

3. What does the acronym CIA stand for in cyber security?

A. Cyber Intelligence Agency
B. Confidentiality, Integrity, Availability
C. Central Information Access
D. Communication, Identification, Authentication

4. Which of the following is NOT a type of malware?

A. Worm
B. Firewall
C. Trojan
D. Ransomware

5. What is the purpose of a firewall?

A. To encrypt sensitive data
B. To block unauthorized access to a network
C. To perform penetration testing
D. To scan for vulnerabilities

6. What is two-factor authentication (2FA)?

A. Using two passwords to log in
B. Verifying identity using two methods (e.g., password and OTP)
C. Changing passwords every two months
D. Allowing access from two devices simultaneously

7. What is the primary function of a Security Information and Event Management (SIEM) tool?

A. To conduct vulnerability scanning
B. To detect and respond to security events
C. To manage user accounts
D. To analyze network performance

8. What is a zero-day vulnerability?

A. A weakness that has been patched immediately
B. A vulnerability exploited before the developer releases a fix
C. A fake vulnerability used for training
D. A method of encrypting data

9. Which protocol is secure for transferring data over the internet?

A. HTTP
B. FTP
C. HTTPS
D. Telnet

10. What does the term “ethical hacking” refer to?

A. Hackers who attack systems for personal gain
B. Using hacking techniques to test and improve security
C. Creating hacking tutorials online
D. Monitoring hacker forums

11. What is the function of penetration testing?

A. To detect and exploit vulnerabilities in a system
B. To monitor network traffic
C. To create firewalls for networks
D. To provide training for IT staff

12. What does ransomware do?

A. Deletes all files from a computer
B. Encrypts files and demands payment for decryption
C. Installs antivirus software without permission
D. Steals data for personal use

13. Which of the following is a best practice for password security?

A. Using “password123” for simplicity
B. Sharing passwords with colleagues
C. Using a strong, unique password for each account
D. Changing passwords every five years

14. What does a VPN do?

A. Blocks malware from infecting devices
B. Encrypts internet traffic and masks the user’s IP address
C. Provides free Wi-Fi access
D. Monitors network traffic for suspicious activity

15. What is the role of a Security Operations Center (SOC)?

A. Developing software applications
B. Centralizing monitoring and responding to security incidents
C. Conducting risk assessments
D. Encrypting all organizational data

Answers

  1. C – To protect systems, networks, and data from cyber threats.
  2. B – Sending fraudulent emails to steal credentials.
  3. B – Confidentiality, Integrity, Availability.
  4. B – Firewall.
  5. B – To block unauthorized access to a network.
  6. B – Verifying identity using two methods (e.g., password and OTP).
  7. B – To detect and respond to security events.
  8. B – A vulnerability exploited before the developer releases a fix.
  9. C – HTTPS.
  10. B – Using hacking techniques to test and improve security.
  11. A – To detect and exploit vulnerabilities in a system.
  12. B – Encrypts files and demands payment for decryption.
  13. C – Using a strong, unique password for each account.
  14. B – Encrypts internet traffic and masks the user’s IP address.
  15. B – Centralizing monitoring and responding to security incidents.

Final Thoughts

How did you do? Share your score and let us know what topics you’d like to learn more about!

At The Coding College, we’re here to help you build your knowledge and skills in cyber security. Explore more quizzes, tutorials, and resources at The Coding College.

Leave a Comment