IASEC
  • 1. What is a security breach?
A) Changing password
B) Unauthorized access to protected systems and data
C) A software update
  • 2. Which of the following is an example of malware?
A) Password manager
B) Virus
C) Firewall
  • 3. Impersonating an organization to trick users is called:
A) Encryption
B) Social engineering
C) Firewall setup
  • 4. A Denial of Service (DoS) attack:
A) Sends too many requests to make a website unavailable
B) Steals passwords directly
C) Installs antivirus
  • 5. What is the difference between DoS and DDoS?
A) No difference
B) DoS uses one attacker; DDoS uses multiple attackers
C) DDoS is smaller than DoS
  • 6. Which is NOT a way to protect yourself from a security breach?
A) Using strong passwords
B) Clicking unknown links
C) Backing up files
  • 7. An attacker is:
A) A system update
B) Someone who protects systems
C) Someone who attempts to compromise security
  • 8. An intruder is:
A) A security guard
B) A software program
C) Someone who gains unauthorized access
  • 9. A hacker is:
A) Only illegal
B) A person skilled in computers and networks
C) Always malicious
  • 10. this hacker is an ethical hacker, who is part of the work
A) Black Hat
B) White Hat
C) Gray Hat
  • 11. this hacker break the rule sometimes. can be legal or illegal
A) White Hat
B) Gray Hat
C) Black Hat
  • 12. the purpose of this malicious hacker is to hack, destroy.
A) Black Hat
B) Gray Hat
C) White Hat
  • 13. A Black Hat hacker is:
A) Ethical hacker
B) Government agent
C) Malicious hacker
  • 14. A White Hat hacker is:
A) Ethical hacker
B) Malicious hacker
C) Criminal hacker
  • 15. Wiretapping means:
A) Encrypting files
B) Updating software
C) Secretly monitoring communications
  • 16. Which of the following can be wiretapped?
A) All of the above
B) Smartphones
C) Instant messages
  • 17. HTTPS is important because it:
A) Makes internet faster
B) Removes ads
C) Encrypts data for secure communication
  • 18. Which is a sign your phone may be wiretapped?
A) Clear signal
B) Unknown sounds during calls
C) Normal battery use
  • 19. Password cracking is:
A) Hacking passwords to gain unauthorized access
B) Creating strong passwords
C) Changing passwords regularly
  • 20. In the DIKW Pyramid, which is the foundation?
A) Information
B) Wisdom
C) Data
  • 21. Knowledge is:
A) Processed and analyzed information
B) Stored files
C) Raw facts
  • 22. is the sysntehis of information and experience in a way that applies knowledge to real-like situations.
A) Information
B) Wisdom
C) Knowledge
  • 23. Information must be available to:
A) Everyone
B) Authorized users
C) The public
  • 24. Information free from errors refers to:
A) Possession
B) Accuracy
C) Utility
  • 25. Protecting information from unauthorized exposure is:
A) Availability
B) Confidentiality
C) Authenticity
  • 26. Ensuring information is not altered or corrupted refers to:
A) Utility
B) Privacy
C) Integrity
  • 27. When information has value and serves a purpose, it refers to:
A) Accuracy
B) Utility
  • 28. State of ownership and control of information is:
A) Confidentiality
B) Availability
C) Possession
  • 29. The three core components of Information Security are:
A) Data, Info, Wisdom
B) DoS, DDoS, MITM
C) CIA (Confidentiality, Integrity, Availability)
  • 30. Denial of Service attack mainly affects:
A) Availability
B) Authenticity
C) Integrity
  • 31. Privacy, Secrecy, and Anonymity are types of:
A) Integrity
B) Possession
C) Confidentiality
  • 32. The Caesar Cipher is an example of:
A) Encryption method
B) Firewall
C) Malware
  • 33. The Enigma Machine during World War II was broken by:
A) Julius Caesar
B) Rhanaeyra Targaryen
C) Alan Turing
  • 34. Protecting physical equipment like computers is:
A) Physical security
B) Operations security
C) Network security
  • 35. Protecting network components from attacks is:
A) Physical security
B) Network security
C) Communications security
  • 36. A security breach occurs when:
A) You update software
B) You change password
C) An intruder gains unauthorized access
  • 37. Spyware is a type of:
A) Malware
B) Backup
C) Firewall
  • 38. Social engineering involves:
A) Encrypting files
B) Disguising as a legitimate organization
C) Updating antivirus
  • 39. one of the oldest and simplest encryption techniques.
A) Caesar cipher
B) Rhanaeyra Targaryen
C) Dracarys
  • 40. It is named after _______, who used it to send secret military messages.
A) Daenerys Targaryen
B) Julius Caesar
C) Allicent HightTower
  • 41. it refers to the collective processes and methods that protect sensitive and valuable information
A) computer security
B) information assurance
  • 42. is defined as the set of measures intended to protect and defend information
A) computer security
B) information assurance
  • 43. the quality or state of being secure that is to be free from danger
A) assurance
B) security
  • 44. What does DIKW stand for?
A) Digital, Information, Key, World
B) Data, Integrity, Knowledge, Work
C) Data, Information, Knowledge, Wisdom
  • 45. In the DIKW Pyramid, the foundation is:
A) Data
B) Information
C) Knowledge
  • 46. Raw facts and figures are called:
A) Knowledge
B) Data
C) Wisdom
  • 47. When data is processed and organized, it becomes:
A) Data
B) Information
C) Security
  • 48. Knowledge is:
A) Random facts
B) Processed and analyzed information
C) Printed documents
  • 49. Which is the highest level in the DIKW Pyramid?
A) Information
B) Wisdom
C) Data
  • 50. occurs when an intruder gains unauthorized access to an organizations protected systems and data
A) security breach
B) access
C) london bridge
  • 51. happens when a hacker steals private info
A) security breach
B) data breach
  • 52. is a cyberattack on hardware, software, or other network resources
A) DoS
B) DDoS
  • 53. one of the most popular Dos attack types. attackers overwhelm their target with unwanted internet traffic
A) DDoS
B) DoS
  • 54. is a way to get info about people without them knowing
A) badwire
B) wiretapping
C) wire
  • 55. is an attempt to infiltrate a system or a network by maliciously taking advantage of softwares weak point
A) Backdoor
B) Frontdoor
  • 56. Protecting personal information from being disclosed
A) Anonymity
B) Secrecy
C) Privacy
  • 57. Hiding the identity of a person
A) Anonymity
B) Secrecy
C) Privacy
  • 58. Protecting sensitive information from unauthorized access
A) Secrecy
B) Privacy
C) Anonymity
  • 59. Physical security focuses on protecting:
A) Passwords
B) Tangible assets like buildings, computers, and equipment
C) Emails
  • 60. Data transmitted through networks and communication channels
A) Network security
B) Communications security
C) Physical security
  • 61. Protecting the secrecy of organizational activities and processes
A) Personal security
B) Physical security
C) Operations security
  • 62. Protecting individual safety and authorized access
A) Operations security
B) Communications security
C) Personal security
  • 63. quality or state of being secure that is to be free from danger
A) Cyersecurity
B) Information Security
C) Security
  • 64. the hierarchy,connects data, info, knowledge, and wisdom in 4 layers
A) IPO
B) GIGO
C) DIKW
  • 65. is knowledge applied in action
A) knowledge
B) wisdom tooth
C) data
  • 66. means to safeguard network components,connection,and data
A) Computer security
B) Network Security
C) Personal security
  • 67. refers to ensuring that an info system is undamaged and has not been tampered with
A) kalapastanganan
B) diet pepsi
C) data integrity
  • 68. Which threat involves unauthorized access to data while it is being transmitted?
A) Interception
B) Fabrication
C) Modification
  • 69. Which threat prevents a system or resource from being available to its intended users?
A) Fabrication
B) Interception
C) Interruption
  • 70. Which threat occurs when data is altered or tampered with intentionally?
A) Fabrication
B) Interruption
C) Modification
  • 71. Which threat is when an attacker inserts false data or fake resources into a system?
A) Interruption
B) Modification
C) Fabrication
Created with That Quiz — a math test site for students of all grade levels.