wwc2025

Workshop Post-Assessment

This assessment is multiple choice. Enter your name and answer all questions. Submit once when finished.




1) What does the CIA Triad represent in cybersecurity?
2) In a simple model, risk is best described as:
3) Which option best matches the terms threat and vulnerability?
4) Which control primarily reduces impact (not likelihood) after something goes wrong?
5) Which is the best example of good cyber hygiene?
6) Why are logs valuable even if you think you prevented the attack?
7) Which sequence matches a basic threat detection workflow?
8) What best describes the idea of signal vs noise?
9) Which telemetry source is often most useful when investigating account compromise?
10) What is the main purpose of triage in incident detection?
11) During an incident, which role is primarily responsible for documenting actions and timelines?
12) In the first minutes of an incident, which action is generally the best first step?
13) Which example is social engineering?
14) Why can MFA fatigue (push bombing) work?
15) In a beginner course, why do we teach offensive concepts at all?
16) Which activity is NOT appropriate in a classroom setting?
17) Which step commonly comes first in a high-level attack chain?
18) Why are misconfigurations often a major cause of incidents?
19) What is the main goal of a capstone scenario in this workshop?
20) Which option best describes a teacher-friendly way to use frameworks (NIST, CIS, NICE)?