This is a scored practice assessment. It is not timed. Use it to identify weak domains before a timed attempt.
Cybersecurity practice assessment. Foundations
12 questions

Scenario: You want stronger MFA for email. Which is the most robust option?

identity

Scenario: A transaction value is changed in transit without detection. Which CIA principle failed?

basics

Scenario: You assume password hashes will leak one day. What should you use for password storage?

crypto

Scenario: A colleague receives an urgent invoice link. What is the safest first action?

phishing

Scenario: You must store sensitive data at rest. What is the defensible first step?

basics

Scenario: An admin account is shared by a whole team. What is the main security failure?

identity

Scenario: An attacker reads data they should not. Which principle failed first?

basics

What makes a security control 'defensible'?

governance

Scenario: A user’s session keeps working after password reset. What is the most likely missing control?

identity

Scenario: A service is down because of a DDoS. What is the CIA principle impacted most directly?

basics

Scenario: You must reduce phishing risk quickly. Which control is most effective at scale?

phishing

Scenario: A team wants to invent a new encryption scheme. What is the most defensible response?

crypto
Add CPD reflection (optional)
One short paragraph makes your CPD evidence much stronger.
Pick one incorrect answer and write a one-paragraph note: what assumption changed, what evidence you would gather, and what control you would apply first.

Quick feedback

Optional. This helps improve accuracy and usefulness. No accounts required.