Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Fundamentals | Multiple Choice Questions & Security Principles with Prof. Mumo

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
25-01-2026
Written in
2025/2026

This comprehensive multiple-choice question resource covers cybersecurity fundamentals including threat types, security controls, network protection, data encryption, and risk management principles for information security education and competency. • Multiple-choice questions on cybersecurity threat types • Security controls and defense mechanisms • Network protection and firewall configurations • Data encryption and privacy principles • Risk management and incident response

Show more Read less
Institution
Cybersecurity Fundamentals:
Course
Cybersecurity Fundamentals:

Content preview

Cybersecurity Fundamentals: Multiple Choice Questions
and Answers - Prof. Mumo (2026/2027)




Foundational Cybersecurity Concepts & Practices | Key Domains: CIA Triad (Confidentiality,
Integrity, Availability), Threats & Vulnerabilities, Network Security Basics, Cryptography
Fundamentals, Access Control Models, and Security Best Practices | Expert-Aligned Structure |
Multiple-Choice Q&A Format


Introduction


This structured Cybersecurity Fundamentals Q&A for 2026/2027 provides 85 multiple-choice
questions with correct answers and rationales. It is designed to establish core knowledge of
information security principles, common attack vectors, defensive mechanisms, and
industry-standard practices essential for entry-level cybersecurity roles and foundational
certification exams.


Q&A Structure:


●​ Fundamentals Practice Bank: (85 MULTIPLE-CHOICE QUESTIONS)


Answer Format


All correct answers and security principles must appear in bold and cyan blue, accompanied by
concise rationales explaining the definition of a core concept (e.g., "Integrity ensures data is not
altered unauthorized"), the classification of a specific threat (e.g., a "phishing" attack is social
engineering), the purpose of a security control (e.g., a firewall filters network traffic), the
appropriate mitigation for a given vulnerability, and why the alternative multiple-choice options
misrepresent cybersecurity fundamentals or describe incorrect practices.



Fundamentals Practice Bank (85 Multiple-Choice
Questions)
1. Which principle of the CIA triad ensures that data is not modified by unauthorized parties?

, A. Confidentiality

B. Integrity

C. Availability

D. Authentication

B. Integrity

Rationale: Integrity guarantees that data remains accurate, consistent, and unaltered by unauthorized
users. Confidentiality protects data from unauthorized access; availability ensures systems are
accessible when needed. Authentication verifies identity but is not part of the core CIA triad.

2. A phishing email that tricks a user into revealing their password is primarily an attack on
which CIA principle?

A. Confidentiality

B. Integrity

C. Availability

D. Non-repudiation

A. Confidentiality

Rationale: Phishing compromises confidentiality by stealing sensitive information (e.g., credentials).
While it may lead to integrity or availability issues later, the initial breach targets unauthorized access
to private data.

3. What type of malware encrypts a user’s files and demands payment for decryption?

A. Virus

B. Worm

C. Ransomware

D. Spyware

C. Ransomware

Rationale: Ransomware encrypts files or locks systems, demanding ransom for restoration. Viruses
attach to files and replicate; worms self-propagate across networks; spyware covertly collects user
data. Ransomware directly attacks availability and sometimes integrity.

,4. Which device is primarily used to monitor and control incoming and outgoing network
traffic based on predetermined security rules?

A. Router

B. Switch

C. Firewall

D. Hub

C. Firewall

Rationale: A firewall enforces security policies by filtering traffic between trusted and untrusted
networks. Routers direct traffic between networks; switches connect devices within a LAN; hubs
broadcast all traffic—none provide rule-based security filtering like a firewall.

5. What is the primary purpose of multi-factor authentication (MFA)?

A. To encrypt user passwords

B. To require two or more verification methods to access a system

C. To back up user data automatically

D. To scan for viruses in real time

B. To require two or more verification methods to access a system

Rationale: MFA enhances security by combining something you know (password), something you have
(token), and/or something you are (biometric). This mitigates risks from stolen credentials.
Encryption, backups, and antivirus are separate controls.

6. Which of the following is a social engineering attack?

A. SQL injection

B. Distributed Denial-of-Service (DDoS)

C. Pretexting

D. Man-in-the-middle (MitM)

C. Pretexting

, Rationale: Pretexting involves fabricating a scenario to trick someone into divulging
information—classic social engineering. SQL injection exploits code flaws; DDoS overwhelms services;
MitM intercepts communications—all are technical attacks, not human manipulation.

7. What does the acronym "DDoS" stand for?

A. Data Destruction over System

B. Distributed Denial-of-Service

C. Digital Defense of Servers

D. Direct Data Oversight System

B. Distributed Denial-of-Service

Rationale: DDoS uses multiple compromised systems (a botnet) to flood a target with traffic,
overwhelming resources and denying service to legitimate users. It directly attacks the "Availability"
component of the CIA triad.

8. Which cryptographic method uses the same key for both encryption and decryption?

A. Asymmetric encryption

B. Public key infrastructure (PKI)

C. Symmetric encryption

D. Hashing

C. Symmetric encryption

Rationale: Symmetric encryption (e.g., AES, DES) uses a single shared secret key for both operations.
Asymmetric encryption (e.g., RSA) uses public/private key pairs. Hashing (e.g., SHA-256) is one-way
and not used for decryption.

9. What is the main purpose of a hash function in cybersecurity?

A. To encrypt sensitive data

B. To verify data integrity

C. To authenticate users

D. To compress files for storage

Written for

Institution
Cybersecurity Fundamentals:
Course
Cybersecurity Fundamentals:

Document information

Uploaded on
January 25, 2026
Number of pages
31
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$14.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorAgness Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
11
Member since
2 year
Number of followers
5
Documents
513
Last sold
1 week ago

4.5

2 reviews

5
1
4
1
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions