CYBERSECURITY 2025\2026
MIDTERM EXAM 120 QUESTIONS
AND CORRECT ANSWERS
Which kind of personal information do people send over the Internet?
Credit Card Numbers
Contact Information
Medical Information
All of the above - ANSWER- all of the above
True or False: Learning computer science or coding is only useful if you want to
become a professional programmer.
True
False - ANSWER- false
Which of the following is not true about cybersecurity?
,Recent data breaches have released personal information of hundreds of millions of
people.
Cybersecurity is the protection of computer systems, networks, and data from
digital attacks.
As we rely more on computing devices to store and send data, we increase our
vulnerability to cyber attacks.
Cyber attacks can devastate large organizations, but individuals are largely
unaffected. - ANSWER- Cyber attacks can devastate large organizations, but
individuals are largely unaffected.
(individuals are also largely affected by data breaches from large
organizations. It is their data being leaked.)
Which of the following devices is not connected to the Internet of Things?
An AM/FM radio without any bluetooth or Internet connection capabilities
A wearable device that measures your physical activity and allows you to track
your activity through a mobile app
A smart thermostat that allows you to remotely control your home's temperature
through a mobile app
A digital baby monitor that allows you to stream video and audio of your nursery
from the Internet - ANSWER- An AM/FM radio without any bluetooth or
internet connection capabilities.
Which of the following is true about the Internet of Things?
I. The Internet of Things is the network of devices with the ability to connect and
exchange data.
II. The Internet of Things increases our vulnerability to cyber attacks.
,III. The Internet of Things is purely positive-there are no negative consequences to
increased connectivity
I only
I and II
I and III
None of the above - ANSWER- 1 and 3
In 2016, online fraud cases in the United States resulted in victim losses totaling:
Nothing-online fraud doesn't result in victim losses
$100,000
$2 million
Over $1.2 billion - ANSWER- over 1.2 billion
Which of the following is true about jobs in the field of cybersecurity?
There are a lot of unfilled positions in cybersecurity right now, but in the next few
years all of those positions will be filled.
Right now there aren't many unfilled cybersecurity positions, but there will be
more in the next couple of years.
There are many unfilled cybersecurity positions right now, and there will be even
more unfilled positions in the next couple of years.
There are too many qualified cybersecurity professionals. There are no unfilled
positions now, and there won't be any unfilled positions in the next few years. -
ANSWER- There are many unfilled cybersecurity positions right now, and there
will be even more unfilled positions in the next couple of years.
, In cybersecurity, what does CIA stand for?
Confidentiality, Integrity, Availability
Central Intelligence Agency
Cybersecurity Investigation Agency
Cybersecurity, Internet, Accessibility - ANSWER- Confidentiality, integrity,
availability.
Alice is buying books from an online retail site, and she finds that she is able to
change the price of a book from $19.99 to $1.99.
Which part of the CIA triad has been broken?
Confidentiality
Integrity
Availability - ANSWER- integrity
(Integrity means that data can be trusted. It should be maintained in a correct state,
kept so that it may not be tampered with, and should be correct, authentic, and
reliable)
Cynthia discovers that she has the ability to modify the lunch menu posted on her
school's website. She edits the website so for lunch every day, it says "Green Eggs
and Ham".
Which part of the CIA triad was broken?
Confidentiality
Integrity
Availability
MIDTERM EXAM 120 QUESTIONS
AND CORRECT ANSWERS
Which kind of personal information do people send over the Internet?
Credit Card Numbers
Contact Information
Medical Information
All of the above - ANSWER- all of the above
True or False: Learning computer science or coding is only useful if you want to
become a professional programmer.
True
False - ANSWER- false
Which of the following is not true about cybersecurity?
,Recent data breaches have released personal information of hundreds of millions of
people.
Cybersecurity is the protection of computer systems, networks, and data from
digital attacks.
As we rely more on computing devices to store and send data, we increase our
vulnerability to cyber attacks.
Cyber attacks can devastate large organizations, but individuals are largely
unaffected. - ANSWER- Cyber attacks can devastate large organizations, but
individuals are largely unaffected.
(individuals are also largely affected by data breaches from large
organizations. It is their data being leaked.)
Which of the following devices is not connected to the Internet of Things?
An AM/FM radio without any bluetooth or Internet connection capabilities
A wearable device that measures your physical activity and allows you to track
your activity through a mobile app
A smart thermostat that allows you to remotely control your home's temperature
through a mobile app
A digital baby monitor that allows you to stream video and audio of your nursery
from the Internet - ANSWER- An AM/FM radio without any bluetooth or
internet connection capabilities.
Which of the following is true about the Internet of Things?
I. The Internet of Things is the network of devices with the ability to connect and
exchange data.
II. The Internet of Things increases our vulnerability to cyber attacks.
,III. The Internet of Things is purely positive-there are no negative consequences to
increased connectivity
I only
I and II
I and III
None of the above - ANSWER- 1 and 3
In 2016, online fraud cases in the United States resulted in victim losses totaling:
Nothing-online fraud doesn't result in victim losses
$100,000
$2 million
Over $1.2 billion - ANSWER- over 1.2 billion
Which of the following is true about jobs in the field of cybersecurity?
There are a lot of unfilled positions in cybersecurity right now, but in the next few
years all of those positions will be filled.
Right now there aren't many unfilled cybersecurity positions, but there will be
more in the next couple of years.
There are many unfilled cybersecurity positions right now, and there will be even
more unfilled positions in the next couple of years.
There are too many qualified cybersecurity professionals. There are no unfilled
positions now, and there won't be any unfilled positions in the next few years. -
ANSWER- There are many unfilled cybersecurity positions right now, and there
will be even more unfilled positions in the next couple of years.
, In cybersecurity, what does CIA stand for?
Confidentiality, Integrity, Availability
Central Intelligence Agency
Cybersecurity Investigation Agency
Cybersecurity, Internet, Accessibility - ANSWER- Confidentiality, integrity,
availability.
Alice is buying books from an online retail site, and she finds that she is able to
change the price of a book from $19.99 to $1.99.
Which part of the CIA triad has been broken?
Confidentiality
Integrity
Availability - ANSWER- integrity
(Integrity means that data can be trusted. It should be maintained in a correct state,
kept so that it may not be tampered with, and should be correct, authentic, and
reliable)
Cynthia discovers that she has the ability to modify the lunch menu posted on her
school's website. She edits the website so for lunch every day, it says "Green Eggs
and Ham".
Which part of the CIA triad was broken?
Confidentiality
Integrity
Availability