Welcome to Cybersecurity awareness quiz, which is meant to test your knowledge about cyber security issues. This is an effort to create awareness about this important topic.
Instructions for Cybersecurity Awareness Quiz
This is a 50-question multiple-choice quiz designed to assess your foundational knowledge of cybersecurity, tailored for a risk management professional in a professional services company with global operations.
The quiz covers cybersecurity fundamentals, risk management, compliance, incident response, insurance, and emerging technologies (AI and quantum computing), reflecting the course content from Coursera, CERT, edX, and Udemy, as well as your job requirements. Each question has four options, with one correct answer. Select the best answer for each question. This is a surprise quiz to gauge your awareness on Day 1 of a graduate-level course. Questions 31–40 increase in difficulty, and Questions 41–50 incorporate a mix of legal, technological, and contractual aspects.
Cybersecurity Awareness Quiz
Part 1: Questions 1–15
- What does the CIA triad in cybersecurity represent?
- a) Confidentiality, Integrity, Availability
- b) Compliance, Investigation, Authentication
- c) Control, Isolation, Analysis
- d) Cryptography, Intrusion, Assessment
- Which of the following is a common cybersecurity threat faced by professional services firms?
- a) Physical theft of office equipment
- b) Ransomware attacks locking critical systems
- c) Overheating of server hardware
- d) Employee turnover
- What is the primary purpose of a risk assessment in cybersecurity?
- a) To install antivirus software
- b) To identify and prioritize potential threats and vulnerabilities
- c) To train employees on phishing prevention
- d) To purchase cyber insurance
- Which Indian regulation governs cybersecurity and data protection?
- a) Companies Act, 2013
- b) Information Technology Act, 2000
- c) Securities and Exchange Board of India Act, 1992
- d) Consumer Protection Act, 2019
- What does GDPR stand for, and where is it enforced?
- a) General Data Protection Regulation, European Union
- b) Global Data Privacy Rule, United States
- c) General Data Protection Rule, Middle East
- d) Global Data Protection Regulation, Singapore
- Which of the following is a key component of a cybersecurity governance framework?
- a) Hiring additional IT staff
- b) Aligning security policies with organizational objectives
- c) Purchasing new hardware annually
- d) Conducting employee performance reviews
- What is a primary coverage area of cyber insurance policies in India?
- a) Employee health benefits
- b) Data breach notification and recovery costs
- c) Office property damage
- d) Marketing campaign losses
- What is the first step in a post-breach incident response protocol?
- a) Notify all employees via email
- b) Isolate affected systems to contain the breach
- c) Pay the ransom to attackers
- d) Update all software immediately
- How can AI enhance cybersecurity for a global firm?
- a) By reducing the need for employee training
- b) Through real-time anomaly detection and threat analysis
- c) By replacing all human IT staff
- d) By eliminating the need for compliance
- What future threat does quantum computing pose to cybersecurity?
- a) Increased hardware costs
- b) Potential to break current encryption methods
- c) Reduced internet speeds
- d) Inability to store large datasets
- Which of the following is a best practice for compliance with data privacy laws?
- a) Storing all data indefinitely
- b) Implementing data minimization and encryption
- c) Sharing data with third parties without consent
- d) Avoiding employee training on privacy
- What is a key responsibility of a risk management professional in cybersecurity?
- a) Writing software code for security tools
- b) Overseeing risk assessments and mitigation strategies
- c) Designing network infrastructure
- d) Conducting legal audits
- Which regulation is relevant for data protection in Singapore?
- a) Personal Data Protection Act (PDPA)
- b) California Consumer Privacy Act (CCPA)
- c) Personal Information Protection and Electronic Documents Act (PIPEDA)
- d) Personal Data Protection Law (PDPL)
- What is a common method to reduce insider threats in a professional services firm?
- a) Eliminating all employee access to data
- b) Implementing regular security awareness training
- c) Reducing the use of cloud services
- d) Hiring only external contractors
- Which framework is commonly used for cybersecurity risk management?
- a) ISO 9001
- b) NIST Cybersecurity Framework
- c) Six Sigma
- d) ITIL Framework
Quiz Continues on Next Page