Cybersecurity

cybersecurity L2
August 1, 2025

A Cybersecurity internship is a great opportunity to gain hands-on experience in protecting systems, networks, and data from cyber threats. It prepares you for roles like Security Analyst, Penetration Tester, SOC Analyst, or Cybersecurity Engineer.

What You Learn in a Cybersecurity Internship

  • Fundamentals: CIA Triad (Confidentiality, Integrity, Availability), threat types, risk management
  • Network Security: Firewalls, intrusion detection/prevention systems (IDS/IPS), packet sniffing
  • System Hardening: Securing Linux/Windows environments, patch management
  • Ethical Hacking: Penetration testing, vulnerability assessment, Kali Linux tools
  • Tools:
    • Wireshark (network analysis)
    • Metasploit (exploitation framework)
    • Nmap (network scanner)
    • Burp Suite (web security testing)
    • SIEM tools (Splunk, ELK stack)
  • Incident Response: Monitoring alerts, responding to breaches, reporting
  • Compliance & Governance: GDPR, ISO 27001, HIPAA, SOC2
0%
12

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


cybersecurity

Cybersecurity D1

1 / 44

1)

The “C” in CIA triad stands for:

2 / 44

2)

APT stands for:

3 / 44

3)

Installing ransomware on company servers relates to which kill chain stage?

4 / 44

4)

In a 2024 attack, phishing was used in which kill chain stage?

5 / 44

5)

Which role involves detecting and responding to cyber incidents in real time?

6 / 44

6)

Encrypting customer data ensures:

7 / 44

7)

Phishing attacks target primarily:

8 / 44

8)

Creating a malicious payload is part of which stage?

9 / 44

9)

In 2024, LockBit ransomware affected approximately:

10 / 44

10)

Which of these is an example of confidentiality protection?

11 / 44

11)

Which organization would need cybersecurity the most?

12 / 44

12)

Who benefits from ethical hacking?

13 / 44

13)

Which of the following is a popular ethical hacking certification?

14 / 44

14)

Data breaches in 2024 exposed how many personal records approximately?

15 / 44

15)

Ransomware blocking access to data affects:

16 / 44

16)

Malware includes:

17 / 44

17)

Which is the MOST dangerous due to persistence and sophistication?

18 / 44

18)

Sending phishing emails to a target is:

19 / 44

19)

A financial analyst's salary is often dependent on:

20 / 44

20)

The first stage of cyber kill chain is:

21 / 44

21)

The biggest ethical rule in penetration testing is:

22 / 44

22)

Which CIA principle is most affected if hospital patient records are tampered with?

23 / 44

23)

Which of the following is NOT in the scope of cybersecurity?

24 / 44

24)

Which attack demanded $10 million in 2024 from a retail chain?

25 / 44

25)

Which is an insider threat example?

26 / 44

26)

DDoS attacks primarily impact which CIA component?

27 / 44

27)

Confidentiality ensures that:

28 / 44

28) In 2025, how many internet users are estimated globally?

29 / 44

29)

Integrity is violated when:

30 / 44

30)

How many phishing emails are estimated to be sent daily?

31 / 44

31)

Main objective of cybersecurity is to prevent:

32 / 44

32)

Attackers establishing communication with compromised systems is:

33 / 44

33)

Example of ethical hacking is:

34 / 44

34)

Installing backdoors on victim systems is:

35 / 44

35) Cybersecurity primarily focuses on protecting:

36 / 44

36)

Phishing emails are an example of:

37 / 44

37)

Ethical hacking must always be performed with:

38 / 44

38)

Exploiting unpatched software vulnerabilities occurs in:

39 / 44

39)

The cyber kill chain was developed by:

40 / 44

40) A bank protecting customers from phishing is an example of:

41 / 44

41)

Main role of an ethical hacker is:

42 / 44

42)

A checksum is used to protect which principle of the CIA triad?

43 / 44

43)

Primary goal of malware is:

44 / 44

44)

Penetration testing is also known as:

Your score is

0%

Exit

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


cybersecurity L2

Cybersecurity L2

1 / 100

1) What is the difference between a vulnerability scan and a penetration test?

2 / 100

2) The OWASP Top 10 is updated approximately every:

3 / 100

3) Which security feature protects cloud workloads from unauthorized network access?

4 / 100

4) What does the “containment” phase focus on during incident response?

5 / 100

5) Which tool is commonly used for log management and analysis?

6 / 100

6) What is the main drawback of symmetric encryption?

7 / 100

7) What is the main purpose of a Public Key Infrastructure (PKI)?

8 / 100

8) What does “immutable infrastructure” mean in DevSecOps?

9 / 100

9) Which of the following tools is used for penetration testing automation?

10 / 100

10) What is the role of antivirus “heuristics”?

11 / 100

11) Which one of these algorithms is a cryptographic hash function?

12 / 100

12) Which OWASP vulnerability involves allowing attackers to access functions or data they shouldn’t be able to?

13 / 100

13) Which penetration testing phase includes validating security controls by exploiting vulnerabilities?

14 / 100

14) Which of the following prevents unauthorized access but does not detect it?

15 / 100

15) What is “forensic triage”?

16 / 100

16) What is the purpose of penetration testing?

17 / 100

17) What is the purpose of a honeypot in cybersecurity?

18 / 100

18) What is the first step in the cyber kill chain model?

19 / 100

19) What is the primary purpose of a firewall on an endpoint device?

20 / 100

20) What does a Data Loss Prevention (DLP) system do?

21 / 100

21) Which one of these is considered a cyber threat?

22 / 100

22) What is the role of an Endpoint Detection and Response (EDR) system?

23 / 100

23) What is the difference between a virus and a worm?

24 / 100

24) Which compliance requirement mandates breach notification within 72 hours?

25 / 100

25) Why is “documentation” crucial during incident response and digital forensics?

26 / 100

26) Question

27 / 100

27) Which tool is primarily used for password cracking?

28 / 100

28) Which cryptographic technique uses different keys for encryption and decryption?

29 / 100

29) Which OWASP category includes flaws like missing security headers and misconfigured permissions?

30 / 100

30) What is the role of “post-exploitation” in penetration testing?

31 / 100

31) What does “timeline analysis” refer to in digital forensics?

32 / 100

32) Which standard provides guidelines for IT governance and management?

33 / 100

33) Which vulnerability involves the attacker forcing a logged-in user to perform unwanted actions?

34 / 100

34) Which of the following is an example of social engineering?

35 / 100

35) What is the first step in creating an incident response plan?

36 / 100

36) Which digital forensic tool can analyze Windows registry files?

37 / 100

37) Which type of firewall filters traffic at the network layer?

38 / 100

38) What is a “pivot” in penetration testing?

39 / 100

39) What does “least privilege” mean in access control?

40 / 100

40) Which process involves verifying the identity of a user or system?

41 / 100

41) Which service is commonly used to automate compliance checks in cloud environments?

42 / 100

42) Which cloud service model provides the highest level of user control over the infrastructure?

43 / 100

43) Which type of evidence is considered volatile?

44 / 100

44) What is the purpose of “file carving” in digital forensics?

45 / 100

45) What is the role of a security standard?

46 / 100

46) Which cybersecurity principle ensures that data is not modified by unauthorized users?

47 / 100

47) What does the “principle of least privilege” help prevent?

48 / 100

48) What is the best defense against SQL Injection attacks?

49 / 100

49) What type of security policy defines how an organization responds to security incidents?

50 / 100

50) Which legal document often grants permission to perform penetration testing?

51 / 100

51) What does the term 'cybersecurity' mean?

52 / 100

52) What is the purpose of a digital certificate in cryptography?

53 / 100

53) What is a zero-day vulnerability?

54 / 100

54) What is the function of a Network Access Control (NAC) system?

55 / 100

55) Which DevSecOps tool is used for static application security testing (SAST)?

56 / 100

56) Which system service in Windows is responsible for managing security policies?

57 / 100

57) What is “container orchestration” and which tool is most popular for it?

58 / 100

58) What is a brute force attack in cryptography?

59 / 100

59) A ______ is an attack where the attacker tricks users into clicking malicious links.

60 / 100

60) Which protocol uses cryptographic methods to secure web communication?

61 / 100

61) Which of the following is an example of asymmetric key encryption?

62 / 100

62) What does a firewall do in a network?

63 / 100

63) Which protocol is used to securely transfer files over the Internet?

64 / 100

64) What is the purpose of a “security baseline” in cloud environments?

65 / 100

65) What is the main focus of the Sarbanes-Oxley Act (SOX) in relation to cybersecurity?

66 / 100

66) Which organization publishes the NIST Cybersecurity Framework?

67 / 100

67) What does the “principle of defense in depth” advocate in cloud security?

68 / 100

68) Which encryption technique splits data into fixed-size blocks for processing?

69 / 100

69) In the OWASP Top 10, what does A07:2021 refer to?

70 / 100

70) Which Linux tool helps detect rootkits on a system?

71 / 100

71) Which of these protocols operates over port 443?

72 / 100

72) Which tool is used to exploit known vulnerabilities and automate attacks?

73 / 100

73) What is the primary function of SELinux?

74 / 100

74) What does the term “key length” influence in encryption?

75 / 100

75) Which of the following helps mitigate sensitive data exposure?

76 / 100

76) Which one of the following is a sign of a broken authentication flaw?

77 / 100

77) Which organization primarily develops standards for cybersecurity in the U.S.?

78 / 100

78) What does "sandboxing" refer to in endpoint security?

79 / 100

79)  Which security technology helps protect against Distributed Denial of Service (DDoS) attacks?

80 / 100

80) What is the function of the tool “Snort”?

81 / 100

81) Which of the following is used to ensure data integrity?

82 / 100

82) Which of the following is an example of a passive reconnaissance technique?

83 / 100

83) What does “data carving” help recover?

84 / 100

84) What is “secrets management” in cloud security?

85 / 100

85) What is the key benefit of using containers in DevSecOps?

86 / 100

86)  What is a “policy exception” in cybersecurity?

87 / 100

87) What is a “buffer overflow” attack?

88 / 100

88) Which OWASP vulnerability occurs when the system fails to protect API endpoints properly?

89 / 100

89) What is the primary goal of a disaster recovery plan?

90 / 100

90) Which tool is widely used for network traffic analysis during incident investigations?

91 / 100

91) Which of the following is a layer 2 device in the OSI model?

92 / 100

92) What does IDS stand for in network security?

93 / 100

93) Which Windows feature isolates programs to prevent them from affecting the OS?

94 / 100

94) What kind of attack involves exploiting unpatched software vulnerabilities?

95 / 100

95) Which protocol is used to securely transfer files over the Internet?

96 / 100

96) What does the term “red team” refer to in cybersecurity?

97 / 100

97) Which of the following is a network layer attack?

98 / 100

98) What is “footprinting” in ethical hacking?

99 / 100

99) What is a “data retention policy”?

100 / 100

100) Which device is used to segment a network and reduce traffic?

Your score is

The average score is 71%

0%

Leave a Reply

Your email address will not be published. Required fields are marked *