Cyber Security Basics
Types of Cyber Attacks
Cyber Security Threats
Protective Measures
Incident Management
100

What does the “C” in the CIA Triad stand for?

Confidentiality

100

What is phishing?

A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.

100

What is a vulnerability in a system?

A weakness that can be exploited by a threat.

100

What is encryption used for?

Protecting data by transforming it into a secure format that can only be read with a key.

100

What is the first step in responding to a cyber security incident?

Identifying and containing the threat.

200

Name the three components of the CIA Triad.

Confidentiality, Integrity, Availability

200

What type of attack floods a server to make it unavailable?

Denial of Service (DoS) attack.

200

What is insider threat?

A cyber security risk from someone within an organization, like a disgruntled employee.

200

What is patch management?

Applying updates to software to fix vulnerabilities.

200

Who is responsible for reporting a cyber security incident in an organization?

The incident response team or designated personnel.

300

What is the purpose of cyber security?

To protect information, systems, and networks from cyber threats.

300

What does malware do?

Malicious software designed to harm or exploit a system.

300

List three motivations for cyber attackers.

Espionage, fraud, publicity.

300

What is a firewall?

Software or hardware that blocks unauthorized access to a network.

300

What is the role of a cyber security incident report?

Documenting the details of an incident to prevent future occurrences.

400

What does “integrity” mean in data security?

Ensuring data is accurate and has not been tampered with.

400

What is social engineering in cyber attacks?

A method of tricking individuals into giving out confidential information.

400

What does accidental cyber threat refer to?

A threat caused by mistakes, such as clicking on a phishing link.

400

Name one type of testing measure used to assess cyber vulnerabilities.

Penetration testing.

400

What does CSIRT stand for?

Computer Security Incident Response Team.

500

Give an example of personal data that should be protected under cyber security measures.

Health records, financial data, or national insurance details.

500

What is a botnet?

A network of computers infected with malware and controlled remotely.

500

How does organized crime use cyber attacks?

By performing illegal activities like hacking or fraud, sometimes through sophisticated networks.

500

What is a honeypot in cyber security?

A decoy system used to attract attackers and study their methods.

500

What is the purpose of vulnerability scanning?

To identify and fix potential security weaknesses before they are exploited.

M
e
n
u