Cybersecurity

cybersecurity L2
August 1, 2025

A Cybersecurity internship is a great opportunity to gain hands-on experience in protecting systems, networks, and data from cyber threats. It prepares you for roles like Security Analyst, Penetration Tester, SOC Analyst, or Cybersecurity Engineer.

What You Learn in a Cybersecurity Internship

  • Fundamentals: CIA Triad (Confidentiality, Integrity, Availability), threat types, risk management
  • Network Security: Firewalls, intrusion detection/prevention systems (IDS/IPS), packet sniffing
  • System Hardening: Securing Linux/Windows environments, patch management
  • Ethical Hacking: Penetration testing, vulnerability assessment, Kali Linux tools
  • Tools:
    • Wireshark (network analysis)
    • Metasploit (exploitation framework)
    • Nmap (network scanner)
    • Burp Suite (web security testing)
    • SIEM tools (Splunk, ELK stack)
  • Incident Response: Monitoring alerts, responding to breaches, reporting
  • Compliance & Governance: GDPR, ISO 27001, HIPAA, SOC2
0%
12

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


cybersecurity

Cybersecurity D1

1 / 44

1)

Confidentiality ensures that:

2 / 44

2)

DDoS attacks primarily impact which CIA component?

3 / 44

3)

Which of the following is NOT in the scope of cybersecurity?

4 / 44

4)

Sending phishing emails to a target is:

5 / 44

5)

Which of these is an example of confidentiality protection?

6 / 44

6)

Installing backdoors on victim systems is:

7 / 44

7)

Ransomware blocking access to data affects:

8 / 44

8)

How many phishing emails are estimated to be sent daily?

9 / 44

9)

Example of ethical hacking is:

10 / 44

10)

Phishing emails are an example of:

11 / 44

11)

The first stage of cyber kill chain is:

12 / 44

12)

Primary goal of malware is:

13 / 44

13)

APT stands for:

14 / 44

14)

Encrypting customer data ensures:

15 / 44

15)

Which role involves detecting and responding to cyber incidents in real time?

16 / 44

16)

Ethical hacking must always be performed with:

17 / 44

17)

Main role of an ethical hacker is:

18 / 44

18)

Integrity is violated when:

19 / 44

19)

Main objective of cybersecurity is to prevent:

20 / 44

20)

Which CIA principle is most affected if hospital patient records are tampered with?

21 / 44

21) In 2025, how many internet users are estimated globally?

22 / 44

22)

Which is an insider threat example?

23 / 44

23)

Data breaches in 2024 exposed how many personal records approximately?

24 / 44

24)

Exploiting unpatched software vulnerabilities occurs in:

25 / 44

25)

Penetration testing is also known as:

26 / 44

26)

The biggest ethical rule in penetration testing is:

27 / 44

27)

Attackers establishing communication with compromised systems is:

28 / 44

28) A bank protecting customers from phishing is an example of:

29 / 44

29)

In 2024, LockBit ransomware affected approximately:

30 / 44

30)

Malware includes:

31 / 44

31)

The cyber kill chain was developed by:

32 / 44

32)

Which is the MOST dangerous due to persistence and sophistication?

33 / 44

33)

Who benefits from ethical hacking?

34 / 44

34) Cybersecurity primarily focuses on protecting:

35 / 44

35)

A checksum is used to protect which principle of the CIA triad?

36 / 44

36)

Creating a malicious payload is part of which stage?

37 / 44

37)

Which of the following is a popular ethical hacking certification?

38 / 44

38)

Which organization would need cybersecurity the most?

39 / 44

39)

Phishing attacks target primarily:

40 / 44

40)

Installing ransomware on company servers relates to which kill chain stage?

41 / 44

41)

A financial analyst's salary is often dependent on:

42 / 44

42)

The “C” in CIA triad stands for:

43 / 44

43)

In a 2024 attack, phishing was used in which kill chain stage?

44 / 44

44)

Which attack demanded $10 million in 2024 from a retail chain?

Your score is

0%

Exit

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


cybersecurity L2

Cybersecurity L2

1 / 100

1) Which of the following tools is used for penetration testing automation?

2 / 100

2) Which tool is used to exploit known vulnerabilities and automate attacks?

3 / 100

3) Which Windows feature isolates programs to prevent them from affecting the OS?

4 / 100

4) Which standard provides guidelines for IT governance and management?

5 / 100

5) Which protocol uses cryptographic methods to secure web communication?

6 / 100

6) Which of the following is an example of social engineering?

7 / 100

7)  Which security technology helps protect against Distributed Denial of Service (DDoS) attacks?

8 / 100

8) What is the first step in the cyber kill chain model?

9 / 100

9) Which legal document often grants permission to perform penetration testing?

10 / 100

10) Which one of these is considered a cyber threat?

11 / 100

11) What is a “pivot” in penetration testing?

12 / 100

12) What does the term “red team” refer to in cybersecurity?

13 / 100

13) What does the term “key length” influence in encryption?

14 / 100

14) Which device is used to segment a network and reduce traffic?

15 / 100

15) Which process involves verifying the identity of a user or system?

16 / 100

16) What is the purpose of a “security baseline” in cloud environments?

17 / 100

17) What does the “principle of least privilege” help prevent?

18 / 100

18) What is the role of an Endpoint Detection and Response (EDR) system?

19 / 100

19) What does the term 'cybersecurity' mean?

20 / 100

20) What does “timeline analysis” refer to in digital forensics?

21 / 100

21) What is a “buffer overflow” attack?

22 / 100

22) Which of the following is an example of asymmetric key encryption?

23 / 100

23) What is the difference between a vulnerability scan and a penetration test?

24 / 100

24) Which DevSecOps tool is used for static application security testing (SAST)?

25 / 100

25) Which protocol is used to securely transfer files over the Internet?

26 / 100

26) What is the role of antivirus “heuristics”?

27 / 100

27) Which organization primarily develops standards for cybersecurity in the U.S.?

28 / 100

28) In the OWASP Top 10, what does A07:2021 refer to?

29 / 100

29) What does “data carving” help recover?

30 / 100

30) Which tool is widely used for network traffic analysis during incident investigations?

31 / 100

31) Which of the following is a layer 2 device in the OSI model?

32 / 100

32) What is the main focus of the Sarbanes-Oxley Act (SOX) in relation to cybersecurity?

33 / 100

33) Which system service in Windows is responsible for managing security policies?

34 / 100

34) What is “container orchestration” and which tool is most popular for it?

35 / 100

35) Which vulnerability involves the attacker forcing a logged-in user to perform unwanted actions?

36 / 100

36) What is a brute force attack in cryptography?

37 / 100

37) What does a Data Loss Prevention (DLP) system do?

38 / 100

38) What is “forensic triage”?

39 / 100

39) Which of the following is an example of a passive reconnaissance technique?

40 / 100

40) What is the first step in creating an incident response plan?

41 / 100

41) Which Linux tool helps detect rootkits on a system?

42 / 100

42) Which of the following helps mitigate sensitive data exposure?

43 / 100

43) What does the “containment” phase focus on during incident response?

44 / 100

44) What is the primary goal of a disaster recovery plan?

45 / 100

45) Which of these protocols operates over port 443?

46 / 100

46) Which cybersecurity principle ensures that data is not modified by unauthorized users?

47 / 100

47) What is the purpose of a digital certificate in cryptography?

48 / 100

48) Which of the following prevents unauthorized access but does not detect it?

49 / 100

49) What is “secrets management” in cloud security?

50 / 100

50) What is a “data retention policy”?

51 / 100

51) What is the best defense against SQL Injection attacks?

52 / 100

52) Which one of these algorithms is a cryptographic hash function?

53 / 100

53) What is the role of “post-exploitation” in penetration testing?

54 / 100

54) What type of security policy defines how an organization responds to security incidents?

55 / 100

55) What is “footprinting” in ethical hacking?

56 / 100

56) Which type of evidence is considered volatile?

57 / 100

57) Which security feature protects cloud workloads from unauthorized network access?

58 / 100

58) What is the key benefit of using containers in DevSecOps?

59 / 100

59) What is the function of the tool “Snort”?

60 / 100

60) What is the primary function of SELinux?

61 / 100

61) Which tool is commonly used for log management and analysis?

62 / 100

62) What does the “principle of defense in depth” advocate in cloud security?

63 / 100

63) The OWASP Top 10 is updated approximately every:

64 / 100

64) What does “least privilege” mean in access control?

65 / 100

65) Question

66 / 100

66) What is the primary purpose of a firewall on an endpoint device?

67 / 100

67) Which digital forensic tool can analyze Windows registry files?

68 / 100

68) Which tool is primarily used for password cracking?

69 / 100

69) What is the difference between a virus and a worm?

70 / 100

70) A ______ is an attack where the attacker tricks users into clicking malicious links.

71 / 100

71) Which of the following is a network layer attack?

72 / 100

72) What kind of attack involves exploiting unpatched software vulnerabilities?

73 / 100

73) Which organization publishes the NIST Cybersecurity Framework?

74 / 100

74) What is a zero-day vulnerability?

75 / 100

75) Why is “documentation” crucial during incident response and digital forensics?

76 / 100

76) Which encryption technique splits data into fixed-size blocks for processing?

77 / 100

77) Which penetration testing phase includes validating security controls by exploiting vulnerabilities?

78 / 100

78) What does a firewall do in a network?

79 / 100

79) What does “immutable infrastructure” mean in DevSecOps?

80 / 100

80) What is the main drawback of symmetric encryption?

81 / 100

81) What is the purpose of “file carving” in digital forensics?

82 / 100

82)  What is a “policy exception” in cybersecurity?

83 / 100

83) Which cryptographic technique uses different keys for encryption and decryption?

84 / 100

84) What is the purpose of penetration testing?

85 / 100

85) What is the role of a security standard?

86 / 100

86) Which service is commonly used to automate compliance checks in cloud environments?

87 / 100

87) Which OWASP vulnerability involves allowing attackers to access functions or data they shouldn’t be able to?

88 / 100

88) Which one of the following is a sign of a broken authentication flaw?

89 / 100

89) What is the main purpose of a Public Key Infrastructure (PKI)?

90 / 100

90) Which OWASP vulnerability occurs when the system fails to protect API endpoints properly?

91 / 100

91) Which type of firewall filters traffic at the network layer?

92 / 100

92) What is the function of a Network Access Control (NAC) system?

93 / 100

93) Which compliance requirement mandates breach notification within 72 hours?

94 / 100

94) Which of the following is used to ensure data integrity?

95 / 100

95) What does IDS stand for in network security?

96 / 100

96) What does "sandboxing" refer to in endpoint security?

97 / 100

97) Which cloud service model provides the highest level of user control over the infrastructure?

98 / 100

98) Which protocol is used to securely transfer files over the Internet?

99 / 100

99) What is the purpose of a honeypot in cybersecurity?

100 / 100

100) Which OWASP category includes flaws like missing security headers and misconfigured permissions?

Your score is

The average score is 85%

0%

Leave a Reply

Your email address will not be published. Required fields are marked *