ThatQuiz Test Library Take this test now
IASEC
Contributed by: Roan
  • 1. What is a security breach?
A) Unauthorized access to protected systems and data
B) Changing password
C) A software update
  • 2. Which of the following is an example of malware?
A) Virus
B) Password manager
C) Firewall
  • 3. Impersonating an organization to trick users is called:
A) Social engineering
B) Firewall setup
C) Encryption
  • 4. A Denial of Service (DoS) attack:
A) Installs antivirus
B) Steals passwords directly
C) Sends too many requests to make a website unavailable
  • 5. What is the difference between DoS and DDoS?
A) DDoS is smaller than DoS
B) DoS uses one attacker; DDoS uses multiple attackers
C) No difference
  • 6. Which is NOT a way to protect yourself from a security breach?
A) Backing up files
B) Using strong passwords
C) Clicking unknown links
  • 7. An attacker is:
A) A system update
B) Someone who protects systems
C) Someone who attempts to compromise security
  • 8. An intruder is:
A) A security guard
B) A software program
C) Someone who gains unauthorized access
  • 9. A hacker is:
A) Only illegal
B) A person skilled in computers and networks
C) Always malicious
  • 10. this hacker is an ethical hacker, who is part of the work
A) White Hat
B) Gray Hat
C) Black Hat
  • 11. this hacker break the rule sometimes. can be legal or illegal
A) White Hat
B) Gray Hat
C) Black Hat
  • 12. the purpose of this malicious hacker is to hack, destroy.
A) Gray Hat
B) Black Hat
C) White Hat
  • 13. A Black Hat hacker is:
A) Malicious hacker
B) Government agent
C) Ethical hacker
  • 14. A White Hat hacker is:
A) Ethical hacker
B) Malicious hacker
C) Criminal hacker
  • 15. Wiretapping means:
A) Encrypting files
B) Updating software
C) Secretly monitoring communications
  • 16. Which of the following can be wiretapped?
A) All of the above
B) Instant messages
C) Smartphones
  • 17. HTTPS is important because it:
A) Encrypts data for secure communication
B) Removes ads
C) Makes internet faster
  • 18. Which is a sign your phone may be wiretapped?
A) Clear signal
B) Normal battery use
C) Unknown sounds during calls
  • 19. Password cracking is:
A) Hacking passwords to gain unauthorized access
B) Changing passwords regularly
C) Creating strong passwords
  • 20. In the DIKW Pyramid, which is the foundation?
A) Wisdom
B) Data
C) Information
  • 21. Knowledge is:
A) Raw facts
B) Stored files
C) Processed and analyzed information
  • 22. is the sysntehis of information and experience in a way that applies knowledge to real-like situations.
A) Knowledge
B) Wisdom
C) Information
  • 23. Information must be available to:
A) Everyone
B) Authorized users
C) The public
  • 24. Information free from errors refers to:
A) Accuracy
B) Possession
C) Utility
  • 25. Protecting information from unauthorized exposure is:
A) Availability
B) Authenticity
C) Confidentiality
  • 26. Ensuring information is not altered or corrupted refers to:
A) Privacy
B) Integrity
C) Utility
  • 27. When information has value and serves a purpose, it refers to:
A) Accuracy
B) Utility
  • 28. State of ownership and control of information is:
A) Confidentiality
B) Possession
C) Availability
  • 29. The three core components of Information Security are:
A) Data, Info, Wisdom
B) CIA (Confidentiality, Integrity, Availability)
C) DoS, DDoS, MITM
  • 30. Denial of Service attack mainly affects:
A) Availability
B) Integrity
C) Authenticity
  • 31. Privacy, Secrecy, and Anonymity are types of:
A) Possession
B) Confidentiality
C) Integrity
  • 32. The Caesar Cipher is an example of:
A) Malware
B) Firewall
C) Encryption method
  • 33. The Enigma Machine during World War II was broken by:
A) Julius Caesar
B) Alan Turing
C) Rhanaeyra Targaryen
  • 34. Protecting physical equipment like computers is:
A) Network security
B) Physical security
C) Operations security
  • 35. Protecting network components from attacks is:
A) Physical security
B) Communications security
C) Network security
  • 36. A security breach occurs when:
A) You update software
B) An intruder gains unauthorized access
C) You change password
  • 37. Spyware is a type of:
A) Firewall
B) Backup
C) Malware
  • 38. Social engineering involves:
A) Disguising as a legitimate organization
B) Encrypting files
C) Updating antivirus
  • 39. one of the oldest and simplest encryption techniques.
A) Caesar cipher
B) Rhanaeyra Targaryen
C) Dracarys
  • 40. It is named after _______, who used it to send secret military messages.
A) Julius Caesar
B) Allicent HightTower
C) Daenerys Targaryen
  • 41. it refers to the collective processes and methods that protect sensitive and valuable information
A) information assurance
B) computer security
  • 42. is defined as the set of measures intended to protect and defend information
A) computer security
B) information assurance
  • 43. the quality or state of being secure that is to be free from danger
A) security
B) assurance
  • 44. What does DIKW stand for?
A) Digital, Information, Key, World
B) Data, Information, Knowledge, Wisdom
C) Data, Integrity, Knowledge, Work
  • 45. In the DIKW Pyramid, the foundation is:
A) Knowledge
B) Data
C) Information
  • 46. Raw facts and figures are called:
A) Data
B) Knowledge
C) Wisdom
  • 47. When data is processed and organized, it becomes:
A) Security
B) Information
C) Data
  • 48. Knowledge is:
A) Printed documents
B) Random facts
C) Processed and analyzed information
  • 49. Which is the highest level in the DIKW Pyramid?
A) Data
B) Wisdom
C) Information
  • 50. occurs when an intruder gains unauthorized access to an organizations protected systems and data
A) security breach
B) london bridge
C) access
  • 51. happens when a hacker steals private info
A) data breach
B) security breach
  • 52. is a cyberattack on hardware, software, or other network resources
A) DDoS
B) DoS
  • 53. one of the most popular Dos attack types. attackers overwhelm their target with unwanted internet traffic
A) DoS
B) DDoS
  • 54. is a way to get info about people without them knowing
A) wire
B) badwire
C) wiretapping
  • 55. is an attempt to infiltrate a system or a network by maliciously taking advantage of softwares weak point
A) Frontdoor
B) Backdoor
  • 56. Protecting personal information from being disclosed
A) Privacy
B) Anonymity
C) Secrecy
  • 57. Hiding the identity of a person
A) Secrecy
B) Anonymity
C) Privacy
  • 58. Protecting sensitive information from unauthorized access
A) Privacy
B) Anonymity
C) Secrecy
  • 59. Physical security focuses on protecting:
A) Tangible assets like buildings, computers, and equipment
B) Passwords
C) Emails
  • 60. Data transmitted through networks and communication channels
A) Communications security
B) Network security
C) Physical security
  • 61. Protecting the secrecy of organizational activities and processes
A) Physical security
B) Personal security
C) Operations security
  • 62. Protecting individual safety and authorized access
A) Operations security
B) Communications security
C) Personal security
  • 63. quality or state of being secure that is to be free from danger
A) Information Security
B) Cyersecurity
C) Security
  • 64. the hierarchy,connects data, info, knowledge, and wisdom in 4 layers
A) IPO
B) GIGO
C) DIKW
  • 65. is knowledge applied in action
A) wisdom tooth
B) knowledge
C) data
  • 66. means to safeguard network components,connection,and data
A) Computer security
B) Network Security
C) Personal security
  • 67. refers to ensuring that an info system is undamaged and has not been tampered with
A) diet pepsi
B) kalapastanganan
C) data integrity
  • 68. Which threat involves unauthorized access to data while it is being transmitted?
A) Fabrication
B) Modification
C) Interception
  • 69. Which threat prevents a system or resource from being available to its intended users?
A) Interception
B) Fabrication
C) Interruption
  • 70. Which threat occurs when data is altered or tampered with intentionally?
A) Fabrication
B) Interruption
C) Modification
  • 71. Which threat is when an attacker inserts false data or fake resources into a system?
A) Interruption
B) Modification
C) Fabrication
Created with That Quiz — a math test site for students of all grade levels.