Cybersecurity

cybersecurity L2
August 1, 2025

A Cybersecurity internship is a great opportunity to gain hands-on experience in protecting systems, networks, and data from cyber threats. It prepares you for roles like Security Analyst, Penetration Tester, SOC Analyst, or Cybersecurity Engineer.

What You Learn in a Cybersecurity Internship

  • Fundamentals: CIA Triad (Confidentiality, Integrity, Availability), threat types, risk management
  • Network Security: Firewalls, intrusion detection/prevention systems (IDS/IPS), packet sniffing
  • System Hardening: Securing Linux/Windows environments, patch management
  • Ethical Hacking: Penetration testing, vulnerability assessment, Kali Linux tools
  • Tools:
    • Wireshark (network analysis)
    • Metasploit (exploitation framework)
    • Nmap (network scanner)
    • Burp Suite (web security testing)
    • SIEM tools (Splunk, ELK stack)
  • Incident Response: Monitoring alerts, responding to breaches, reporting
  • Compliance & Governance: GDPR, ISO 27001, HIPAA, SOC2
0%
12

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


cybersecurity

Cybersecurity D1

1 / 44

1)

APT stands for:

2 / 44

2)

Installing backdoors on victim systems is:

3 / 44

3)

The “C” in CIA triad stands for:

4 / 44

4)

Encrypting customer data ensures:

5 / 44

5)

Ethical hacking must always be performed with:

6 / 44

6)

Creating a malicious payload is part of which stage?

7 / 44

7)

How many phishing emails are estimated to be sent daily?

8 / 44

8)

Example of ethical hacking is:

9 / 44

9)

Which organization would need cybersecurity the most?

10 / 44

10)

Which role involves detecting and responding to cyber incidents in real time?

11 / 44

11) Cybersecurity primarily focuses on protecting:

12 / 44

12)

DDoS attacks primarily impact which CIA component?

13 / 44

13)

Which of the following is a popular ethical hacking certification?

14 / 44

14)

Integrity is violated when:

15 / 44

15)

Exploiting unpatched software vulnerabilities occurs in:

16 / 44

16)

Phishing attacks target primarily:

17 / 44

17)

Which of these is an example of confidentiality protection?

18 / 44

18)

Which attack demanded $10 million in 2024 from a retail chain?

19 / 44

19)

Phishing emails are an example of:

20 / 44

20)

Who benefits from ethical hacking?

21 / 44

21)

Attackers establishing communication with compromised systems is:

22 / 44

22)

Main objective of cybersecurity is to prevent:

23 / 44

23) In 2025, how many internet users are estimated globally?

24 / 44

24)

Which CIA principle is most affected if hospital patient records are tampered with?

25 / 44

25)

Malware includes:

26 / 44

26)

A financial analyst's salary is often dependent on:

27 / 44

27)

Which is an insider threat example?

28 / 44

28)

In 2024, LockBit ransomware affected approximately:

29 / 44

29) A bank protecting customers from phishing is an example of:

30 / 44

30)

In a 2024 attack, phishing was used in which kill chain stage?

31 / 44

31)

The biggest ethical rule in penetration testing is:

32 / 44

32)

Penetration testing is also known as:

33 / 44

33)

Data breaches in 2024 exposed how many personal records approximately?

34 / 44

34)

Which is the MOST dangerous due to persistence and sophistication?

35 / 44

35)

Ransomware blocking access to data affects:

36 / 44

36)

The first stage of cyber kill chain is:

37 / 44

37)

Primary goal of malware is:

38 / 44

38)

Installing ransomware on company servers relates to which kill chain stage?

39 / 44

39)

A checksum is used to protect which principle of the CIA triad?

40 / 44

40)

The cyber kill chain was developed by:

41 / 44

41)

Sending phishing emails to a target is:

42 / 44

42)

Confidentiality ensures that:

43 / 44

43)

Main role of an ethical hacker is:

44 / 44

44)

Which of the following is NOT in the scope of cybersecurity?

Your score is

0%

Exit

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


cybersecurity L2

Cybersecurity L2

1 / 100

1) What is the purpose of a honeypot in cybersecurity?

2 / 100

2) Which of the following tools is used for penetration testing automation?

3 / 100

3) Which organization primarily develops standards for cybersecurity in the U.S.?

4 / 100

4) What does "sandboxing" refer to in endpoint security?

5 / 100

5) Which of the following helps mitigate sensitive data exposure?

6 / 100

6) What is “container orchestration” and which tool is most popular for it?

7 / 100

7) Which system service in Windows is responsible for managing security policies?

8 / 100

8) Which Linux tool helps detect rootkits on a system?

9 / 100

9) Which tool is used to exploit known vulnerabilities and automate attacks?

10 / 100

10) What is the difference between a virus and a worm?

11 / 100

11) What does the term 'cybersecurity' mean?

12 / 100

12) Question

13 / 100

13) Which of the following is a network layer attack?

14 / 100

14) What is a “data retention policy”?

15 / 100

15) What is “forensic triage”?

16 / 100

16) What is “footprinting” in ethical hacking?

17 / 100

17) What is “secrets management” in cloud security?

18 / 100

18) What is a brute force attack in cryptography?

19 / 100

19) What is the role of a security standard?

20 / 100

20) What is the purpose of a “security baseline” in cloud environments?

21 / 100

21) Which type of evidence is considered volatile?

22 / 100

22) Which of these protocols operates over port 443?

23 / 100

23) Which compliance requirement mandates breach notification within 72 hours?

24 / 100

24) Which one of the following is a sign of a broken authentication flaw?

25 / 100

25) What type of security policy defines how an organization responds to security incidents?

26 / 100

26) What is the function of the tool “Snort”?

27 / 100

27) The OWASP Top 10 is updated approximately every:

28 / 100

28) Which cryptographic technique uses different keys for encryption and decryption?

29 / 100

29) What is the main purpose of a Public Key Infrastructure (PKI)?

30 / 100

30) What is the main focus of the Sarbanes-Oxley Act (SOX) in relation to cybersecurity?

31 / 100

31) In the OWASP Top 10, what does A07:2021 refer to?

32 / 100

32) Which of the following is used to ensure data integrity?

33 / 100

33) Which of the following is an example of social engineering?

34 / 100

34) Which legal document often grants permission to perform penetration testing?

35 / 100

35) What is the first step in creating an incident response plan?

36 / 100

36) Which standard provides guidelines for IT governance and management?

37 / 100

37) Which process involves verifying the identity of a user or system?

38 / 100

38) Which of the following is a layer 2 device in the OSI model?

39 / 100

39) Which of the following is an example of asymmetric key encryption?

40 / 100

40)  Which security technology helps protect against Distributed Denial of Service (DDoS) attacks?

41 / 100

41) What is the purpose of penetration testing?

42 / 100

42) What does the term “red team” refer to in cybersecurity?

43 / 100

43) What is the best defense against SQL Injection attacks?

44 / 100

44) What is a “buffer overflow” attack?

45 / 100

45) Which of the following is an example of a passive reconnaissance technique?

46 / 100

46) Which tool is commonly used for log management and analysis?

47 / 100

47)  What is a “policy exception” in cybersecurity?

48 / 100

48) Which security feature protects cloud workloads from unauthorized network access?

49 / 100

49) Which Windows feature isolates programs to prevent them from affecting the OS?

50 / 100

50) Which organization publishes the NIST Cybersecurity Framework?

51 / 100

51) What is a “pivot” in penetration testing?

52 / 100

52) What does a Data Loss Prevention (DLP) system do?

53 / 100

53) What is the role of “post-exploitation” in penetration testing?

54 / 100

54) Which tool is primarily used for password cracking?

55 / 100

55) Which of the following prevents unauthorized access but does not detect it?

56 / 100

56) What is the difference between a vulnerability scan and a penetration test?

57 / 100

57) What is the function of a Network Access Control (NAC) system?

58 / 100

58) Which service is commonly used to automate compliance checks in cloud environments?

59 / 100

59) A ______ is an attack where the attacker tricks users into clicking malicious links.

60 / 100

60) What is the role of antivirus “heuristics”?

61 / 100

61) What does the “containment” phase focus on during incident response?

62 / 100

62) Which one of these algorithms is a cryptographic hash function?

63 / 100

63) What is a zero-day vulnerability?

64 / 100

64) What does a firewall do in a network?

65 / 100

65) What does the “principle of defense in depth” advocate in cloud security?

66 / 100

66) Which penetration testing phase includes validating security controls by exploiting vulnerabilities?

67 / 100

67) Which type of firewall filters traffic at the network layer?

68 / 100

68) Which one of these is considered a cyber threat?

69 / 100

69) Which protocol uses cryptographic methods to secure web communication?

70 / 100

70) What is the purpose of “file carving” in digital forensics?

71 / 100

71) Which cloud service model provides the highest level of user control over the infrastructure?

72 / 100

72) What does “data carving” help recover?

73 / 100

73) What is the primary goal of a disaster recovery plan?

74 / 100

74) Which tool is widely used for network traffic analysis during incident investigations?

75 / 100

75) Which vulnerability involves the attacker forcing a logged-in user to perform unwanted actions?

76 / 100

76) Which DevSecOps tool is used for static application security testing (SAST)?

77 / 100

77) What does “immutable infrastructure” mean in DevSecOps?

78 / 100

78) Which OWASP vulnerability occurs when the system fails to protect API endpoints properly?

79 / 100

79) Which protocol is used to securely transfer files over the Internet?

80 / 100

80) Which OWASP vulnerability involves allowing attackers to access functions or data they shouldn’t be able to?

81 / 100

81) Which OWASP category includes flaws like missing security headers and misconfigured permissions?

82 / 100

82) What is the main drawback of symmetric encryption?

83 / 100

83) What does IDS stand for in network security?

84 / 100

84) What is the purpose of a digital certificate in cryptography?

85 / 100

85) Why is “documentation” crucial during incident response and digital forensics?

86 / 100

86) Which device is used to segment a network and reduce traffic?

87 / 100

87) What is the key benefit of using containers in DevSecOps?

88 / 100

88) What is the primary purpose of a firewall on an endpoint device?

89 / 100

89) What does “timeline analysis” refer to in digital forensics?

90 / 100

90) What is the first step in the cyber kill chain model?

91 / 100

91) Which encryption technique splits data into fixed-size blocks for processing?

92 / 100

92) What does “least privilege” mean in access control?

93 / 100

93) Which cybersecurity principle ensures that data is not modified by unauthorized users?

94 / 100

94) What is the role of an Endpoint Detection and Response (EDR) system?

95 / 100

95) What does the term “key length” influence in encryption?

96 / 100

96) Which protocol is used to securely transfer files over the Internet?

97 / 100

97) What does the “principle of least privilege” help prevent?

98 / 100

98) What is the primary function of SELinux?

99 / 100

99) Which digital forensic tool can analyze Windows registry files?

100 / 100

100) What kind of attack involves exploiting unpatched software vulnerabilities?

Your score is

The average score is 85%

0%

Leave a Reply

Your email address will not be published. Required fields are marked *