3. Networking and Security

Cybersecurity Basics — Quiz

Test your understanding of cybersecurity basics with 5 practice questions.

Read the lesson first

Practice Questions

Question 1

In a scenario where a highly sensitive government document is encrypted using a robust algorithm, but the encryption key is stolen due to a weak administrative password, which cybersecurity principle is primarily compromised?

Question 2

A company implements a security measure where users are required to use a hardware token that generates a one-time password (OTP) in addition to their regular password for logging into critical systems. This measure primarily enhances which aspect of authentication?

Question 3

Consider a sophisticated malware attack that modifies the boot sector of a server, preventing the operating system from loading correctly and rendering the server inoperable. Which principle of the CIA triad is most directly and severely impacted by this type of attack?

Question 4

A cryptographic system uses two mathematically linked keys: a public key for encryption and a private key for decryption. This describes which type of encryption?

Question 5

An attacker sends a crafted email that appears to be from a legitimate bank, asking the recipient to click on a link to verify their account details. The link leads to a fake website designed to steal credentials. This is a classic example of which common attack vector?