Froggy Jumps Cyber Shield QuizOnline version Cybersecurity basics by Josh Pearson 1 What is the primary purpose of a firewall? a To block unauthorized traffic between networks b To store passwords securely c To speed up internet connections 2 What does MFA stand for? a Multi-Data Authorization b Multi-Factor Authentication c Managed File Access 3 Which is a common phishing sign? a Public Wi-Fi warning b Strong password policy c Unsolicited requests for sensitive data 4 Which protocol provides encrypted web traffic? a FTP b HTTP c HTTPS 5 What is ransomware? a Malware that encrypts files for ransom b Virus scanning software c A type of firewall 6 Which is a strong password practice? a Using birthdates b Long, unique passwords per site c Short passwords 7 Which is a secure way to remote into a system? a Telnet b VPN c Ftp 8 What is social engineering? a Automating data backups b Hardware optimization c Tricking people to reveal confidential info 9 Which tool helps detect suspicious network activity? a Disk Defragmenter b Email client c Intrusion Detection System (IDS) 10 What is zero trust security primarily about? a Assume breach and verify every access b Blocking all traffic by default c Only using encryption 11 Which type of malware hides in legitimate software? a Trojan horse b Worm c Ransomware 12 What is a DDoS attack? a Overwhelming a service with traffic b Single-user login failure c Data decryption 13 Which practice helps protect data at rest? a Open sharing b Encryption c Unencrypted backups 14 What is a VPN primarily used for? a Scan local networks b Block all internet access c Create a secure remote connection 15 Which is a strong method of user authentication? a Password only b PIN only c Biometric plus password 16 What does a security audit involve? a Installing software b Reviewing controls and compliance c Increasing bandwidth 17 Which attack exploits input handling? a SQL injection b Spoofing c Phishing 18 What is data leakage? a Data encryption b Unintentional data exposure c Strong access control 19 Which device should be secured to reduce risk? a Endpoints (computers, phones) b Routers only c Servers only 20 What is phishing? a Fraudulent messages to obtain sensitive data b Code compilation c System backup 21 Which security principle minimizes trusted access? a Least privilege b Most privilege c Equal access 22 What is a digital signature? a A brand logo b Proof of data origin and integrity c A password policy 23 Which is a secure way to dispose of data? a Leave in place b Ignore old data c Wipe or destroy storage 24 What does TLS provide? a Data compression b Encryption for data in transit c Unencrypted transfers 25 Which password policy is recommended? a Use the same password everywhere b Use a passphrase and change periodically c Never change passwords 26 What is incident response? a Process to handle cybersecurity incidents b Process to design software c Process to install updates 27 Which control reduces success of brute force attacks? a Open login attempts b Account lockout policies c Multiple password entries 28 What is a security patch? a Software update fixing vulnerabilities b System backup c New feature release 29 Which is a common endpoint security measure? a Router firmware b Antivirus/EDR software c Wireless printer 30 What does data minimization mean? a Collect only necessary data b Share data publicly c Store all data forever 31 Which term describes data that can't be altered? a Confidentiality b Integrity c Availability 32 Which protocol is insecure for remote login? a HTTPS b Telnet c SSH 33 What is a security incident ticket? a Record of a detected security event b A hardware upgrade request c A software license 34 Which practice improves password security? a Writing passwords on sticky notes b Reusing passwords c Using a password manager 35 Which is a threat vector? a Phishing emails b Educational seminars c Private browsing 36 What does encryption do? a Deletes data"]},{ b Makes data unreadable without keys c Increases data size 37 Which security model grants access by role? a DAC b MAC c RBAC 38 What is a security operation center? a A software development team b A hardware testing team c A team monitoring security events 39 Which attack targets passwords through dashboards? a Credential stuffing b Phishing c SQL injection 40 What is data backup importance? a Reduce encryption b Restore data after loss or breach c Increase data size 41 Which element is part of CIA triad? a Integrity b Confidentiality c Accessibility 42 What is endpoint detection and response? a Monitoring endpoints for threats b Network address translation c Data erasure 43 Which is a strong network access control method? a Open wireless b 802.1X with strong authentication c WEP security 44 What is a security false positive? a A confirmed breach b A harmless login c Valid event flagged as threat 45 Which is a phishing-resistant MFA method? a SMS codes b Email reminders c Hardware security keys 46 What is telemetry in security context? a Manual reporting only b Customer billing data c Automated data collection for monitoring 47 Which is an example of data at rest encryption? a Plain text file b Unencrypted backups c Encrypted hard drive 48 What is a man-in-the-middle attack? a Denial of service b Attacker intercepts communication c Brute force attack 49 Which security framework is widely used in enterprises? a ISO 9001 b NIST Cybersecurity Framework c COBIT 50 What is a honeypot in cybersecurity? a Decoy system to trap attackers b Backup copy c Antivirus signature 51 Which is a common IoT security risk? a Weak default passwords b High processor speed c Strong encryption by default 52 What does threat modeling do? a Writes user manuals b Increases latency c Identifies potential threats early