cybersecurity quiz
Quiz by zaid
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
What is the main purpose of the Kerberos authentication protocol?
To manage firewall rules
To enable single sign-on for users
To encrypt email communications
To perform biometric verification
20s - Q2
In the context of cybersecurity, what is a 'Race Condition' vulnerability?
A vulnerability that exploits the timing of user input
An attack that relies on brute force to gain access
A security hole created by outdated software
A flaw that occurs due to parallel execution of code
30s - Q3
Which type of malware is specifically designed to collect personal information without the user's knowledge?
Ransomware
Worm
Spyware
Trojan
30s - Q4
What technique is used by attackers to manipulate a web application by injecting malicious SQL queries?
Phishing
Cross-Site Scripting (XSS)
Buffer Overflow
SQL Injection
30s - Q5
What is the primary function of a Security Information and Event Management (SIEM) system?
To perform penetration testing
To aggregate and analyze security events
To store backup data
To filter network traffic
30s - Q6
What is a 'Rainbow Table' used for in the context of cybersecurity?
To crack hashed passwords
To monitor network traffic
To encrypt data
To store secure keys
30s - Q7
What is 'Data Exfiltration' in the context of cybersecurity?
The unauthorized transfer of data out of a system
The encryption of sensitive data
The prevention of data breaches
The destruction of data on a compromised system
30s - Q8
In a cybersecurity context, what is the purpose of 'Tokenization'?
To perform user authentication
To encrypt files
To replace sensitive data with non-sensitive tokens
To detect intrusions
30s - Q9
Which of the following is an example of a 'Logic Bomb'?
A phishing email
A type of malware that encrypts files
A denial-of-service attack
A virus that activates on a specific date
30s - Q10
What is 'Elliptic Curve Cryptography' (ECC) primarily used for?
Encrypting email communications
Secure key exchange and digital signatures
Generating random numbers
Analyzing network traffic
30s - Q11
What is the purpose of the 'Air Gap' security measure?
To separate secure networks from unsecured ones
To provide redundancy in data storage
To enhance wireless network security
To encrypt communications over the internet
30s - Q12
Which of the following is a method used to hide data within another file, such as an image or audio file?
Hashing
Cryptography
Tokenization
Steganography
30s - Q13
What is the main goal of a 'Pharming' attack?
To gather information through social engineering
To redirect users to a fake website without their knowledge
To flood a network with traffic
To trick users into downloading malware
30s - Q14
What is the primary function of the 'Diffie-Hellman' key exchange protocol?
Authenticating users
Encrypting data at rest
Securely exchanging cryptographic keys over a public channel
Detecting malware
30s - Q15
Which attack allows an attacker to execute arbitrary code in a program's memory?
Cross-Site Scripting (XSS)
Buffer Overflow
SQL Injection
Phishing
30s