Cybersecurity_Unit1_Quiz_vsj.pptx for students

VijuJigajinni1 6 views 59 slides Oct 28, 2025
Slide 1
Slide 1 of 59
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59

About This Presentation

cyber security based quiz for BE students with answers


Slide Content

Quiz: Cybersecurity Concepts and Threats (Unit-1) By Dr. Vijaylakshmi Jigajinni

Question 1 Which of the following is NOT a goal of cybersecurity (CIA triad )? a) Confidentiality b) Integrity c) Availability d) Profitability

Answer 1 ✅ d) Profitability

Question 3 In which decade did cybersecurity concepts begin to formally evolve with the advent of ARPANET?

Answer 3 ✅ 1970s

Question 4 Which layer of security focuses on protecting operating systems and applications? a) Network layer b) Application layer c) Physical layer d) Data link layer

Answer 4 ✅ b) Application layer

Question 5 What does ransomware primarily do?

Answer 5 ✅ Encrypts files and demands payment for decryption.

Question 6 Phishing is an example of: a) Social engineering attack b) Malware infection c) Insider threat d) Denial-of-service attack

Answer 6 ✅ a) Social engineering attack

Question 7 A vulnerability becomes dangerous when it is combined with a(n):

Answer 7 ✅ Exploit

Question 8 Which of the following is an active attack? a) Traffic analysis b) Eavesdropping c) Denial of Service d) Packet sniffing

Answer 8 ✅ c) Denial of Service

Question 9 Structured attacks are usually carried out by:

Answer 9 ✅ Skilled professionals, often with specific goals.

Question 10 Which of these is considered the broadest potential target area for attackers?

Answer 10 ✅ Attack surface

Question 11 Define cybersecurity.

Answer 11 ✅ The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.

Question 12 What is meant by Confidentiality in the CIA triad?

Answer 12 ✅ Ensuring that sensitive data is accessed only by authorized users.

Question 13 State one example each for passive and active attacks.

Answer 13 ✅ Passive: Eavesdropping; Active: Man-in-the-Middle.

Question 14 Differentiate between vulnerability and risk.

Answer 14 ✅ Vulnerability = weakness; Risk = potential damage when a threat exploits vulnerability.

Question 15 What is an exploit?

Answer 15 ✅ A tool, code, or technique used to take advantage of a vulnerability.

Question 16 Why is insider attack often more dangerous than outsider attack?

Answer 16 ✅ Insiders already have authorized access, making detection harder.

Question 17 Mention one example of unstructured attack.

Answer 17 ✅ A novice hacker trying random passwords (script kiddie).

Question 18 State one reason for the growing need of cybersecurity.

Answer 18 ✅ Increase in digital transactions and data breaches.

Question 19 List the three main layers of security.

Answer 19 ✅ Physical security, network security, application security.

Question 20 Give one real-life example of ransomware.

Answer 20 ✅ WannaCry attack (2017).

Question 21 A company discovers an employee secretly copying confidential data to a USB. Which attack is this?

Answer 21 ✅ Insider attack

Question 22 If an attacker intercepts communication without altering it, classify the attack.

Answer 22 ✅ Passive attack

Question 23 An attacker launches a botnet to overwhelm a website’s server. What type of attack?

Answer 23 ✅ Denial-of-Service (Active, Structured)

Question 24 Identify missing CIA triad: Confidentiality, Integrity, ?

Answer 24 ✅ Availability

Question 25 If a vulnerability is exploited by malware, what three terms apply?

Answer 25 ✅ Vulnerability, exploit, risk

Question 26 A user clicks on a fake bank login page and enters credentials. What attack occurred?

Answer 26 ✅ Phishing

Question 27 Nation-sponsored hackers target an organization’s network. Classification?

Answer 27 ✅ Structured, state-sponsored attack

Question 28 A student crashes a server using a simple script. What type of attack?

Answer 28 ✅ Unstructured attack

Question 29 What is the risk if a hospital’s database is left without encryption?

Answer 29 ✅ Unauthorized disclosure of sensitive medical records.

Question 30 Which layer of security would biometric access controls belong to?

Answer 30 ✅ Physical layer