Cyber Security
Cybersecurity refers to the application of a comprehensive set of technologies, processes, and controls aimed at safeguarding systems, networks, programs, devices, and data from cyberattacks. These attacks can be perpetrated by malicious actors with the intent to gain unauthorized access, disrupt operations, steal sensitive information, or render systems inoperable.
Take this assessment to check where do you stand in the Cyber Security.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
NYXPoints are used to generate the Leaderboard (coming soon). They are awarded for achieving a certain score.
- 200 nyxpoints for a passing score of 80% or more
- 300 nyxpoints for a perfect score of 100%
- Didn’t pass? You still get 30 nyxpoints for attempting the assesment
IMPORTANT instructions for taking the Assessment
- The timer starts when you click Start Assessment
- DO NOT refresh/reload the page or use the back button to navigate away from the page.
- Navigating away from the assessment page DOES NOT stop/pause the timer and the will restart the assessment when you come back to it. The answers are NOT saved.
General
- There are NO pre-requisites to take this assessment. Take this assessment even if you are completely new to Linux.
- The assessment is completely FREE.
- Preferably take it in a closed book mode.
- DO NOT copy/paste, share or upload questions elsewhere.
Eligible Rewards

300 NyxCoins*
* NyxCoins vary on score
Assessment Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
What does VPN stand for?
CorrectIncorrect -
Question 2 of 30
2. Question
Which of the following is not considered a best practice for creating strong passwords?
CorrectIncorrect -
Question 3 of 30
3. Question
What is phishing?
CorrectIncorrect -
Question 4 of 30
4. Question
Which of the following is an example of two-factor authentication (2FA)?
CorrectIncorrect -
Question 5 of 30
5. Question
What is the purpose of a firewall?
CorrectIncorrect -
Question 6 of 30
6. Question
Which of the following is not a type of malware?
CorrectIncorrect -
Question 7 of 30
7. Question
What is the primary purpose of SSL/TLS in cybersecurity?
CorrectIncorrect -
Question 8 of 30
8. Question
What is the purpose of encryption?
CorrectIncorrect -
Question 9 of 30
9. Question
Which of the following is an example of a brute-force attack?
CorrectIncorrect -
Question 10 of 30
10. Question
What is the purpose of a security policy?
CorrectIncorrect -
Question 11 of 30
11. Question
Which of the following is a common symptom of a ransomware attack?
CorrectIncorrect -
Question 12 of 30
12. Question
What is the purpose of a vulnerability assessment?
CorrectIncorrect -
Question 13 of 30
13. Question
Which of the following practices is an example of a strong security posture?
CorrectIncorrect -
Question 14 of 30
14. Question
What is the purpose of network segmentation?
CorrectIncorrect -
Question 15 of 30
15. Question
Which of the following is not a common method of social engineering?
CorrectIncorrect -
Question 16 of 30
16. Question
What is the purpose of a penetration test?
CorrectIncorrect -
Question 17 of 30
17. Question
What is the difference between a virus and a worm?
CorrectIncorrect -
Question 18 of 30
18. Question
Which of the following is an example of a physical security measure?
CorrectIncorrect -
Question 19 of 30
19. Question
What is the purpose of an incident response plan?
CorrectIncorrect -
Question 20 of 30
20. Question
Which of the following is not a common type of cyber-attack?
CorrectIncorrect -
Question 21 of 30
21. Question
What is the purpose of data masking?
CorrectIncorrect -
Question 22 of 30
22. Question
Which of the following is an example of a strong authentication factor?
CorrectIncorrect -
Question 23 of 30
23. Question
What is the purpose of a security audit?
CorrectIncorrect -
Question 24 of 30
24. Question
Which of the following is a common method of data exfiltration?
CorrectIncorrect -
Question 25 of 30
25. Question
What is the purpose of an antivirus program?
CorrectIncorrect -
Question 26 of 30
26. Question
Which of the following is an example of a security incident?
CorrectIncorrect -
Question 27 of 30
27. Question
What is the purpose of a honeypot?
CorrectIncorrect -
Question 28 of 30
28. Question
What is the purpose of a data classification policy?
CorrectIncorrect -
Question 29 of 30
29. Question
Which of the following is an example of a security control?
CorrectIncorrect -
Question 30 of 30
30. Question
What is the purpose of a security awareness training program?
CorrectIncorrect