and Answers - Prof. Mumo (2026/2027)
Foundational Cybersecurity Concepts & Practices | Key Domains: CIA Triad (Confidentiality,
Integrity, Availability), Threats & Vulnerabilities, Network Security Basics, Cryptography
Fundamentals, Access Control Models, and Security Best Practices | Expert-Aligned Structure |
Multiple-Choice Q&A Format
Introduction
This structured Cybersecurity Fundamentals Q&A for 2026/2027 provides 85 multiple-choice
questions with correct answers and rationales. It is designed to establish core knowledge of
information security principles, common attack vectors, defensive mechanisms, and
industry-standard practices essential for entry-level cybersecurity roles and foundational
certification exams.
Q&A Structure:
● Fundamentals Practice Bank: (85 MULTIPLE-CHOICE QUESTIONS)
Answer Format
All correct answers and security principles must appear in bold and cyan blue, accompanied by
concise rationales explaining the definition of a core concept (e.g., "Integrity ensures data is not
altered unauthorized"), the classification of a specific threat (e.g., a "phishing" attack is social
engineering), the purpose of a security control (e.g., a firewall filters network traffic), the
appropriate mitigation for a given vulnerability, and why the alternative multiple-choice options
misrepresent cybersecurity fundamentals or describe incorrect practices.
Fundamentals Practice Bank (85 Multiple-Choice
Questions)
1. Which principle of the CIA triad ensures that data is not modified by unauthorized parties?
, A. Confidentiality
B. Integrity
C. Availability
D. Authentication
B. Integrity
Rationale: Integrity guarantees that data remains accurate, consistent, and unaltered by unauthorized
users. Confidentiality protects data from unauthorized access; availability ensures systems are
accessible when needed. Authentication verifies identity but is not part of the core CIA triad.
2. A phishing email that tricks a user into revealing their password is primarily an attack on
which CIA principle?
A. Confidentiality
B. Integrity
C. Availability
D. Non-repudiation
A. Confidentiality
Rationale: Phishing compromises confidentiality by stealing sensitive information (e.g., credentials).
While it may lead to integrity or availability issues later, the initial breach targets unauthorized access
to private data.
3. What type of malware encrypts a user’s files and demands payment for decryption?
A. Virus
B. Worm
C. Ransomware
D. Spyware
C. Ransomware
Rationale: Ransomware encrypts files or locks systems, demanding ransom for restoration. Viruses
attach to files and replicate; worms self-propagate across networks; spyware covertly collects user
data. Ransomware directly attacks availability and sometimes integrity.
,4. Which device is primarily used to monitor and control incoming and outgoing network
traffic based on predetermined security rules?
A. Router
B. Switch
C. Firewall
D. Hub
C. Firewall
Rationale: A firewall enforces security policies by filtering traffic between trusted and untrusted
networks. Routers direct traffic between networks; switches connect devices within a LAN; hubs
broadcast all traffic—none provide rule-based security filtering like a firewall.
5. What is the primary purpose of multi-factor authentication (MFA)?
A. To encrypt user passwords
B. To require two or more verification methods to access a system
C. To back up user data automatically
D. To scan for viruses in real time
B. To require two or more verification methods to access a system
Rationale: MFA enhances security by combining something you know (password), something you have
(token), and/or something you are (biometric). This mitigates risks from stolen credentials.
Encryption, backups, and antivirus are separate controls.
6. Which of the following is a social engineering attack?
A. SQL injection
B. Distributed Denial-of-Service (DDoS)
C. Pretexting
D. Man-in-the-middle (MitM)
C. Pretexting
, Rationale: Pretexting involves fabricating a scenario to trick someone into divulging
information—classic social engineering. SQL injection exploits code flaws; DDoS overwhelms services;
MitM intercepts communications—all are technical attacks, not human manipulation.
7. What does the acronym "DDoS" stand for?
A. Data Destruction over System
B. Distributed Denial-of-Service
C. Digital Defense of Servers
D. Direct Data Oversight System
B. Distributed Denial-of-Service
Rationale: DDoS uses multiple compromised systems (a botnet) to flood a target with traffic,
overwhelming resources and denying service to legitimate users. It directly attacks the "Availability"
component of the CIA triad.
8. Which cryptographic method uses the same key for both encryption and decryption?
A. Asymmetric encryption
B. Public key infrastructure (PKI)
C. Symmetric encryption
D. Hashing
C. Symmetric encryption
Rationale: Symmetric encryption (e.g., AES, DES) uses a single shared secret key for both operations.
Asymmetric encryption (e.g., RSA) uses public/private key pairs. Hashing (e.g., SHA-256) is one-way
and not used for decryption.
9. What is the main purpose of a hash function in cybersecurity?
A. To encrypt sensitive data
B. To verify data integrity
C. To authenticate users
D. To compress files for storage