15 Questions
What does the CIA triad stand for in the context of cyber security?
Confidentiality, Integrity, Availability
Which concept of cyber security ensures that sensitive information remains private and accessible only to authorized individuals or entities?
Confidentiality
What is the main goal of maintaining the integrity of data and systems in cybersecurity?
To ensure the accuracy and trustworthiness of data and systems
Which term refers to the practice of protecting computer systems, networks, and data from digital threats and unauthorized access?
Cybersecurity
What is the main purpose of implementing measures such as encryption and access controls in cybersecurity?
To prevent unauthorized access to data
Which component of the CIA triad refers to the availability of data and systems when needed?
Availability
What is the primary focus of cybersecurity in terms of availability?
Ensuring digital resources and services are consistently accessible
Which of the following is an example of cybercrime involving deceptive communication?
Phishing
What type of cybercrime involves using digital platforms for child pornography or grooming?
Child Exploitation
Which cyberattack type involves overwhelming websites or networks with traffic to disrupt services?
DDoS Attacks
What is the primary purpose of Man-in-the-Middle (MitM) attacks?
Intercepting and altering communication between two parties without their knowledge
What does SQL Injection involve?
Exploiting vulnerabilities in web applications to gain unauthorized access to databases and extract data
What is the main characteristic of Cross-Site Scripting (XSS) attacks?
Injecting malicious scripts into websites that are then executed by unsuspecting users' browsers
What is the primary purpose of Ransomware attacks?
Encrypting a victim's data and demanding a ransom for its release
What is the main objective of Social Engineering attacks?
Manipulating individuals into divulging confidential or personal information
Test your knowledge on the fundamentals of cyber security including the concept of cyber security, cyber crimes, types of attacks, and hacker techniques. This quiz covers the basics of protecting computer systems, networks, devices, and data from digital threats and unauthorized access.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free