AP Cybersecurity Practice Exam: Full-Length 40 MCQ + 3 FRQ with Answers and Explanations
AP Cybersecurity Practice Exam
A complete practice exam covering all 5 units with 40 scenario-based multiple choice questions and 3 free response questions. Interactive scoring with detailed explanations for every question.
By Tanner Crow, AP CS Teacher (11+ Years) · Aligned to the College Board Framework
Exam Overview
This practice exam simulates the AP Cybersecurity Exam experience with 40 multiple choice questions (Section 1) and 3 free response questions (Section 2). Questions are distributed across all five course units and test the three core skill categories: Analyze Risk, Mitigate Risk, and Detect Attacks.
How to take this exam: For each MCQ, read the scenario carefully, formulate your answer before looking at options, then select your choice and click “Check Answer.” For FRQs, attempt to write your response before clicking “Show Answer” to compare. For the best practice experience, try to complete all 40 MCQs in one sitting.
For a quick 15-question sampler, try our AP Cybersecurity Practice Questions page instead.
Section 1: Multiple Choice (40 Questions)
Unit 1: Introduction to Security
Questions 1–7Question 1 · Unit 1 · Topic 1.1
A user receives a text message claiming to be from their bank: “ALERT: Unusual login detected on your account. Click here to verify your identity within 30 minutes or your account will be locked.” Which social engineering tactics are primarily being used in this message?
✅ Correct Answer: B
The message uses intimidation (threatening account lockout — a negative consequence) and urgency (the 30-minute deadline pressures the target to act quickly without verifying). While authority is partially present (the bank is a trusted entity), the primary lever is the threat + deadline combination. Scarcity (C) refers to limited availability of something, not time pressure.
Question 2 · Unit 1 · Topic 1.2
A system administrator reviews an authentication log and notices the following pattern: 47 failed login attempts for the user account “admin” between 2:00 AM and 2:15 AM, all from IP address 203.0.113.45, followed by a successful login at 2:16 AM. Which type of attack does this evidence MOST likely indicate?
✅ Correct Answer: C
The pattern of many rapid failed attempts from a single IP followed by success is characteristic of an online password attack (brute force or dictionary attack against a live authentication portal). Credential stuffing (B) uses stolen credentials and would typically show fewer attempts. A rainbow table attack (D) is an offline attack against a captured hash database, not a live login portal. Social engineering (A) does not produce this log pattern.
Question 3 · Unit 1 · Topic 1.3
An adversary drives through a business district with specialized equipment that detects wireless network signals extending outside buildings. The adversary records the SSID, encryption type, and signal strength of each network detected. This activity describes which type of attack?
✅ Correct Answer: A
War driving is when adversaries drive or walk around a target area to detect wireless network beacons, gathering information about SSIDs, encryption types, and areas where the signal extends beyond the physical building. This is a reconnaissance activity, not an active attack. An evil twin (B) involves setting up a fake access point. Jamming (C) involves disrupting signals. ARP poisoning (D) targets internal network tables, not wireless signals.
Question 4 · Unit 1 · Topic 1.4
An adversary uses a generative AI tool to craft a phishing email in perfect Japanese, targeting employees at a Tokyo-based company. The email contains no grammatical errors or unnatural phrasing. Which AI capability is the adversary primarily exploiting?
✅ Correct Answer: D
The adversary is using a generative AI tool (LLM) to create phishing messages in a language they may not speak natively. The course framework specifically notes that AI allows adversaries to craft phishing messages in any language that read as though written by a native speaker, eliminating the traditional indicator of unnatural language in phishing emails. The scenario does not involve voice cloning (A), malware development (B), or social media reconnaissance (C).
Question 5 · Unit 1 · Topic 1.5
A security team uses an AI-powered tool to analyze application code and identify vulnerabilities. The AI tool recommends several code changes. According to AP Cybersecurity best practices, what should happen NEXT?
✅ Correct Answer: B
The course framework repeatedly emphasizes that AI recommendations should always be reviewed by a knowledgeable human before being implemented. This applies to code vulnerability fixes, firewall rule suggestions, and detection rules. AI should never automatically deploy changes (A). Running the tool again (C) does not substitute for human review. Ignoring AI entirely (D) wastes a valuable defensive tool.
Question 6 · Unit 1 · Topic 1.3
Consider the following statements about adversary classifications:
I. Low-skilled adversaries can only exploit known vulnerabilities using tools created by others.
II. High-skilled adversaries have the capacity to discover undocumented vulnerabilities known as zero days.
III. Adversary motivation is limited to financial gain.
Which of the statements above are correct?
✅ Correct Answer: D
Statement I is correct: low-skilled adversaries rely on tools created by others that exploit known vulnerabilities. Statement II is correct: high-skilled adversaries can create new tools, modify existing ones, and discover zero-day vulnerabilities. Statement III is incorrect: adversaries have a variety of motivations including greed, desire for recognition, dedication to a cause, revenge, politics, and beliefs.
Question 7 · Unit 1 · Topic 1.4
A company employee receives a video call from someone who appears to be the CEO, requesting an urgent transfer of proprietary files. The employee notices the CEO’s lip movements seem slightly out of sync with the audio. Which defense is MOST appropriate in this situation?
✅ Correct Answer: A
The scenario describes a likely deepfake video call using AI-generated voice and image. A shared secret (A) is the most direct defense — a phrase known only to the real CEO and trusted employees that verifies identity in high-stakes situations. MFA (B) protects account login but does not verify the identity of someone already on a call. Anti-malware (C) does not detect deepfakes on the caller’s end. Option D is a general AI safety practice unrelated to this specific attack.
Unit 2: Securing Spaces
Questions 8–16Question 8 · Unit 2 · Topic 2.1
An adversary calls a company’s reception desk and says: “Hi, this is Dave from the IT department. I’m troubleshooting a server issue and need to verify some account credentials.” The adversary is not actually from the IT department. This social engineering tactic is BEST classified as:
✅ Correct Answer: C
The adversary uses pretexting (creating a believable story about troubleshooting a server issue) combined with authority (impersonating someone from the IT department, a position of power over technical matters). No time deadline is given (not urgency). The adversary does not claim others have complied (not consensus). Familiarity would require pretending to be a personal acquaintance, not just someone from a department.
Question 9 · Unit 2 · Topic 2.1
During a cyberattack, an adversary uses open source intelligence (OSINT) to gather publicly available information about a target organization from websites and social media. This activity occurs in which phase of a cyberattack?
✅ Correct Answer: A
The reconnaissance phase is when adversaries gather as much information as possible about their target, often using OSINT (freely available information from websites, social media, and public records). This happens before any active attack. Initial access (B) is establishing a foothold. Lateral movement (C) happens after access is gained. Evading detection (D) is the final phase.
Question 10 · Unit 2 · Topic 2.1
A company discovers that a former employee who was recently terminated has been accessing internal systems using credentials that were never deactivated. The former employee downloaded proprietary research data and sold it to a competitor. This adversary is BEST classified as:
✅ Correct Answer: B
Insider adversaries are unique threats because they already have legitimate credentials and access. This former employee used credentials that were never revoked — legitimate access that should have been removed. The motivation (revenge after termination, plus financial gain from selling data) aligns with typical insider threat motivations. Script kiddies (A) lack the insider access described. Nothing indicates a social cause (C) or critical infrastructure disruption (D).
Question 11 · Unit 2 · Topic 2.1
A risk assessment determines that a specific vulnerability has a high likelihood of being exploited but would result in low severity of damage. The cost of mitigation significantly exceeds the potential financial loss. Which risk management strategy is MOST appropriate?
✅ Correct Answer: D
When the cost of mitigation significantly exceeds the expected loss from an attack, risk acceptance is appropriate. The framework states that organizations favor solutions that are cost-effective — costing less to install and maintain than the expected loss. Since this vulnerability has low severity and mitigation is too expensive, accepting the residual risk is the most rational strategy.
Question 12 · Unit 2 · Topic 2.1
Which of the following BEST describes the relationship between confidentiality, integrity, and availability in the CIA triad?
✅ Correct Answer: A
The CIA triad consists of three complementary principles that together form the foundation of information security. Confidentiality ensures only authorized access, integrity ensures data accuracy, and availability ensures access when needed. A defense-in-depth strategy addresses all three. They are not ranked (B) — the priority depends on context. They are not mutually exclusive (C). They apply to both digital and physical security (D).
Question 13 · Unit 2 · Topic 2.2
An adversary enters a restricted data center by walking closely behind an authorized employee who badges through a secure door. The employee does not notice the adversary following them. Which physical attack is this, and which control would MOST effectively prevent it?
✅ Correct Answer: C
This is tailgating because the adversary follows closely behind without the employee’s knowledge. (If the employee knowingly held the door, it would be piggybacking.) An access control vestibule (also called a mantrap) physically prevents more than one person from passing through at a time, directly stopping tailgating. Training (A) helps but is less reliable than a physical control. Shoulder surfing (B) involves watching someone enter credentials. Card cloning (D) addresses a different attack vector.
Question 14 · Unit 2 · Topic 2.3
A company’s workstation security policy requires employees to lock their computers before leaving their desks, use privacy screen filters, connect to surge protectors, and clear sensitive documents from their workstations. This policy is an example of which type of security control?
✅ Correct Answer: B
A security policy is a managerial control — it is a set of rules, guidelines, and procedures that specify what security measures should be in place. While the policy mentions physical items (surge protectors) and technical actions (locking computers), the policy itself is managerial. The individual items it mandates may be physical or technical controls, but the document that requires them is managerial.
Question 15 · Unit 2 · Topic 2.4
A security team is deciding where to place motion sensors in a corporate building. Which placement strategy would produce the FEWEST false alarms while still being effective?
✅ Correct Answer: D
Motion sensors should be placed in areas where traffic is unexpected, like server rooms or areas with restricted access. In high-traffic areas (lobbies, cafeterias, offices), motion sensors create many false alarms, which leads to alert fatigue — responders become accustomed to false alerts and take them less seriously. Server rooms (D) have minimal legitimate traffic, so any motion detected is genuinely suspicious.
Question 16 · Unit 2 · Topic 2.1
A risk assessment document includes the following entry: “Vulnerability: Unencrypted customer database. Asset value: $2.4 million. Likelihood: High (known exploit, low skill required). Severity: $800,000 estimated loss. Risk rating: 9/10.” This assessment uses which type of risk analysis?
✅ Correct Answer: C
This assessment uses both quantitative and qualitative methods. The quantitative elements include the dollar amounts ($2.4M asset value, $800K estimated loss) and the numeric rating (9/10). The qualitative element is the descriptive term “High” for likelihood. In practice, organizations often combine both approaches for a more complete risk picture.
Unit 3: Securing Networks
Questions 17–26Question 17 · Unit 3 · Topic 3.1
An adversary sends falsified ARP packets to a network’s default gateway, causing the gateway’s ARP table to associate the target device’s IP address with the adversary’s MAC address. All traffic intended for the target now routes through the adversary’s device. This describes which type of attack?
✅ Correct Answer: B
ARP poisoning sends falsified ARP packets to the default gateway, modifying its ARP table to link the target’s IP address with the adversary’s MAC address. This redirects traffic through the adversary, creating an on-path (man-in-the-middle) attack. MAC flooding (A) targets switch MAC tables with many different addresses. DNS poisoning (C) targets DNS records. A smurf attack (D) uses ICMP broadcasts.
Question 18 · Unit 3 · Topic 3.4
A network administrator needs a firewall that can inspect packet headers, track the state of active connections, perform deep packet inspection, and filter traffic by application type. Which type of firewall meets ALL of these requirements?
✅ Correct Answer: D
A next-generation firewall (NGFW) has all capabilities of stateless and stateful firewalls plus advanced features including intrusion prevention, deep packet inspection, and filtering by application type. A stateless firewall (A) only filters by packet headers. A stateful firewall (B) adds connection tracking but not deep packet inspection or application filtering. The combination in (C) does not provide application-level filtering.
Question 19 · Unit 3 · Topic 3.4
A firewall has these ACL rules in order:
Rule 1: ALLOW inbound TCP port 443 from ALL
Rule 2: ALLOW inbound TCP port 22 from 10.0.0.0/8
Rule 3: DENY inbound TCP ALL from ALL
Which statement about this configuration is correct?
✅ Correct Answer: A
ACL rules are checked in order, and the first matching rule executes. Rule 1 allows HTTPS (443) from anywhere. Rule 2 allows SSH (22) only from 10.0.0.0/8. Rule 3 denies everything else. Rules do not override each other (B) — they execute sequentially. The 10.0.0.0/8 subnet (C) covers 10.0.0.0–10.255.255.255, not all addresses. ACL rule sets do not create conflicts (D) — the order resolves all ambiguity.
Question 20 · Unit 3 · Topic 3.3
A network architect places a web server that handles public customer requests in a network segment between two firewalls — one facing the public internet and one facing the internal corporate network. This segment is separate from the internal network where employee data is stored. This architecture describes a:
✅ Correct Answer: C
A screened subnet (DMZ) sits between the public internet and the internal network, typically protected by firewalls on both sides. It holds publicly-facing resources (like web servers) to keep them separated from sensitive internal systems. VLANs (A) logically separate devices on switches but don’t describe this specific two-firewall architecture. A VPN (B) provides encrypted remote access. Port security (D) limits MAC addresses per port.
Question 21 · Unit 3 · Topic 3.5
A company’s SIEM system generates 500 alerts per day, but investigation reveals that 95% of them are false positives. Security analysts have started dismissing alerts without investigation because they assume most are false. This condition is known as:
✅ Correct Answer: D
Alert fatigue occurs when responders become accustomed to false positives and begin taking alerts less seriously, assuming they are false before investigating. This is a critical risk because real attacks hidden among the false alerts may go uninvestigated. A false negative (A) is when detection misses an attack — here the system is detecting too much, not too little.
Question 22 · Unit 3 · Topic 3.5
A security team is choosing between signature-based and anomaly-based detection for a network that processes high volumes of traffic with inconsistent patterns due to seasonal business fluctuations. Which detection method is MOST appropriate and why?
✅ Correct Answer: A
Signature-based detection is preferred here for two reasons: (1) it is more efficient for high-volume traffic because it runs faster than anomaly-based methods, and (2) anomaly-based detection requires consistent traffic patterns to establish a reliable baseline. With inconsistent seasonal patterns, anomaly detection would produce excessive false positives, as normal business fluctuations would appear anomalous.
Question 23 · Unit 3 · Topic 3.1
An adversary sends many Ethernet frames to a network switch, each with a different source MAC address. Once the switch’s MAC address table is full, the switch begins forwarding all frames to every port. The adversary’s goal in this attack is to:
✅ Correct Answer: B
MAC flooding overwhelms a switch’s MAC address table, forcing the switch into broadcast mode. In broadcast mode, all frames are sent to every port, allowing the adversary to eavesdrop (sniff) all network traffic. This is distinct from ARP poisoning (A, which modifies gateway ARP tables), a smurf/DDoS attack (C, which uses ICMP), and DNS poisoning (D, which targets DNS records).
Question 24 · Unit 3 · Topic 3.2
A wireless security policy requires the following: users must authenticate through an EAP connected to an approved authentication server, all wireless traffic must be encrypted using AES with a minimum key length, and beacon frame broadcasting must be disabled. Disabling beacon frames primarily makes it harder for adversaries to:
✅ Correct Answer: C
Beacon frames broadcast a network’s SSID and basic properties (like encryption protocols). Disabling beacon frame broadcasting makes it harder for adversaries to discover that the network exists and learn its basic properties — they would need to use more advanced techniques to detect the network. It does not affect encryption strength (A), DoS attacks (B), or authentication attacks (D).
Question 25 · Unit 3 · Topic 3.3
An adversary finds an open, unused network port in a conference room. They plug in their own wireless access point, creating a connection to the internal LAN. Authorized employees can now unknowingly connect to this adversary-controlled access point. This is known as:
✅ Correct Answer: D
A rogue access point is created when an adversary plugs an unauthorized wireless access point into an open network port, gaining direct access to the internal LAN and potentially allowing wireless access from outside the physical space. While similar to an evil twin (A), the distinction is that a rogue AP is physically connected to the internal network, bypassing firewalls entirely. An evil twin mimics a legitimate network’s SSID but is not connected to the target’s infrastructure.
Question 26 · Unit 3 · Topic 3.5
A network administrator notices that no wireless devices in the building’s east wing can connect to the Wi-Fi network, while devices in all other areas connect normally. A scan reveals strong electromagnetic noise in the wireless frequency range localized to the east wing. This evidence indicates:
✅ Correct Answer: B
A jamming attack floods a specific area with strong electromagnetic signals in the same frequency range as the wireless network, preventing legitimate traffic between the access point and users. The localized nature (only the east wing) and the detection of EM noise in the wireless range are the definitive indicators. An evil twin (A) would allow connections to a fake network, not prevent all connections. DNS poisoning (C) and ARP poisoning (D) do not affect wireless signal strength.
Unit 4: Securing Devices
Questions 27–34Question 27 · Unit 4 · Topic 4.1
A manufacturing plant uses internet-connected sensors to monitor water pressure in pipes. These sensors have minimal processing power, limited storage, and run specialized instruction sets. They are connected to the internet for remote monitoring. These devices are BEST classified as:
✅ Correct Answer: D
IoT (Internet of Things) devices are everyday devices with embedded computers. The sensors have minimal processing power and storage, specialized instruction sets, and are connected to the internet — all characteristics of embedded/IoT devices. They are not personal computers (A), servers (B), or handheld devices (C). IoT devices are often uniquely vulnerable because they tend to be slower, cheaper, and harder to update.
Question 28 · Unit 4 · Topic 4.1
An employee downloads a free PDF converter tool from the internet. After installation, the employee’s computer begins running slowly, and an investigation reveals that the tool installed a hidden program giving an adversary remote access to the machine. The hidden program is BEST classified as:
✅ Correct Answer: B
The malware was hidden inside software that appeared legitimate (a PDF converter) — the defining characteristic of a trojan. The hidden program providing remote access is a Remote Access Trojan (RAT). It is not a worm (A) because the employee actively downloaded and installed it (worms spread without human interaction). Slow performance alone does not indicate ransomware (C). A logic bomb (D) triggers on specific conditions, not immediately after installation.
Question 29 · Unit 4 · Topic 4.1
Consider the following malware descriptions:
I. Spreads from one computer to another without human interaction
II. Requires a user to execute or open a file to activate
III. Embeds in the operating system and can make itself invisible to detection tools
Which malware types do these descriptions correspond to, respectively?
✅ Correct Answer: C
Description I (spreads without human interaction) = Worm. Description II (requires user activation) = Virus. Description III (embeds in OS and hides from detection) = Rootkit. The key distinctions: viruses need user action while worms don’t, and rootkits are uniquely capable of controlling the OS and hiding themselves from detection tools.
Question 30 · Unit 4 · Topic 4.2
A cryptographic hash function produces a 256-bit output. Which of the following statements about this hash function is NOT true?
✅ Correct Answer: A
Statement A is NOT true — cryptographic hash functions have pre-image resistance, meaning it is infeasible to determine the original input from the hash output. There is no “decryption key” for a hash because hashing is one-way, not encryption. Statements B (repeatability), C (collision possibility), and D (fixed output length) are all true properties of cryptographic hash functions.
Question 31 · Unit 4 · Topic 4.2
An adversary captures a company’s password database and discovers the passwords are hashed but not salted. The adversary has a pre-computed rainbow table. Against which of the following password configurations would the rainbow table attack be MOST effective?
✅ Correct Answer: D
Rainbow tables are pre-computed mappings of common passwords to their hashes. They are most effective against short, common passwords (D) because these passwords are most likely to appear in the pre-computed table. A 24-character random password (A) is extremely unlikely to be in any rainbow table. SHA-512 vs. MD5 (B) does not affect the attack — rainbow tables can be built for any algorithm. Salting (C) would defeat the attack entirely, but the scenario states passwords are NOT salted.
Question 32 · Unit 4 · Topic 4.1
A hospital’s network monitoring system detects that an employee’s computer is sending data to an unknown external IP address at regular intervals. Investigation reveals no unauthorized software on the disk. The malicious code appears to be running in RAM and using legitimate system programs to exfiltrate data. This malware is BEST classified as:
✅ Correct Answer: C
Fileless malware is malicious code that lives in RAM (not on disk) and uses legitimate programs already installed on the device to compromise it. The key indicators are: no unauthorized software found on disk + code running in memory + using legitimate system programs. A virus (A) would leave files on disk. Ransomware (B) would encrypt files and display a ransom demand. A keylogger (D) records keystrokes specifically, not general data exfiltration.
Question 33 · Unit 4 · Topic 4.2
An organization’s security policy requires passwords to be at least 16 characters, use a mix of uppercase, lowercase, numbers, and special characters spread throughout the password, and enable MFA for all accounts. This policy MOST directly addresses which vulnerability?
✅ Correct Answer: A
The policy specifically targets authentication strength — longer passwords with distributed special characters resist brute force and dictionary attacks, while MFA adds an additional layer. This directly addresses the vulnerability of weak authentication being exploited by automated password attacks. The policy does not address software patching (B), open ports (C), or anti-malware (D).
Question 34 · Unit 4 · Topic 4.2
An adversary attempts the password “admin123” against 10,000 different user accounts on a corporate network, hoping that at least one user has this common password. This attack is BEST described as:
✅ Correct Answer: B
Password spraying is when an adversary attempts a common password against many different user accounts. This differs from brute force (A, which tests all possible combinations against one account), a dictionary attack (C, which tests many common passwords against one account), and credential stuffing (D, which uses previously stolen username/password pairs).
Unit 5: Securing Applications and Data
Questions 35–40Question 35 · Unit 5 · Topic 5.4
Two parties need to establish a secure communication channel over the internet. They have never communicated before and have no shared secret key. They decide to use asymmetric encryption to exchange a symmetric key, then switch to symmetric encryption for the actual data. Why is this combined approach used instead of using asymmetric encryption for all data?
✅ Correct Answer: A
The combined approach exists because asymmetric encryption is significantly slower than symmetric encryption. It is computationally expensive for large amounts of data. By using asymmetric encryption only for the small key exchange (solving the key distribution problem) and then switching to the faster symmetric algorithm for bulk data, systems get the best of both approaches. Option D reverses the key-sharing properties — symmetric requires a shared key, asymmetric does not.
Question 36 · Unit 5 · Topic 5.4
A company needs to verify that a downloaded software update has not been tampered with during transit. The software vendor publishes a SHA-256 hash of the original file on their website. After downloading the update, the company should:
✅ Correct Answer: C
Because hash functions are repeatable (same input = same output), computing the SHA-256 hash of the downloaded file and comparing it to the vendor’s published hash verifies data integrity. If the hashes match, the file has not been modified. Hashing is not encryption (A), so there is no decryption step. AES encryption (B) is unrelated to integrity verification. While AI (D) could help, the standard and most direct method is hash comparison.
Question 37 · Unit 5 · Topic 5.5
A web application allows users to enter their name in a form field. An adversary enters a string that causes the application to execute unintended commands on the database server, returning records from a table the application was never designed to access. Which TWO practices would MOST effectively prevent this vulnerability?
I. Input validation — checking that user input conforms to expected formats
II. Encrypting the database with AES-256
III. Input sanitization — removing or escaping potentially dangerous characters from user input
IV. Enabling MFA for database administrators
✅ Correct Answer: B
Input validation (I) checks that user input conforms to expected formats (rejecting unexpected characters), and input sanitization (III) removes or escapes potentially dangerous characters before they reach the database. Together, they directly prevent injection attacks by ensuring user input cannot be interpreted as commands. Database encryption (II) protects data at rest but does not prevent the application from executing malicious queries. MFA for admins (IV) controls access but does not address the application’s input handling vulnerability.
Question 38 · Unit 5 · Topic 5.4
A user sends an encrypted email to a colleague using the colleague’s public key. Which statement about this communication is correct?
✅ Correct Answer: D
In asymmetric encryption, data encrypted with a public key can only be decrypted with the corresponding private key. Since the email was encrypted with the colleague’s public key, only the colleague’s private key can decrypt it. The public key cannot decrypt what it encrypted (B). The sender’s keys are not involved in decryption (A, C).
Question 39 · Unit 5 · Topic 5.4
A Certificate Authority (CA) issues a digital certificate to a company’s web server. The primary purpose of this digital certificate is to:
✅ Correct Answer: A
A digital certificate issued by a CA binds a public key to a verified identity, creating a chain of trust. When users connect to the server, they can verify (through the CA’s signature on the certificate) that the public key truly belongs to the legitimate company, not an impersonator. Certificates do not encrypt stored data (B), do not eliminate the need for symmetric encryption (C), and do not prevent DoS attacks (D).
Question 40 · Unit 5 · Topic 5.5
Consider the following statements about encryption and hashing:
I. Encryption is a two-way process — data can be encrypted and then decrypted with the appropriate key.
II. Hashing is a one-way process — the original input cannot be recovered from the hash output.
III. AES is a hashing algorithm commonly used to verify data integrity.
Which of the statements above are correct?
✅ Correct Answer: C
Statement I is correct: encryption is two-way (encrypt with a key, decrypt with a key). Statement II is correct: hashing is one-way with pre-image resistance. Statement III is incorrect: AES (Advanced Encryption Standard) is a symmetric encryption algorithm, not a hashing algorithm. Hashing algorithms include SHA-256, SHA-512, and MD5. This distinction between encryption and hashing is fundamental to the course.
Section 2: Free Response (3 Questions)
For each FRQ, read the scenario and all parts carefully. Write your response on paper or in a text editor before clicking “Show Answer” to compare with the sample response. Points are noted for each part.
Free Response Question 1 · Units 1–2
Physical Security Risk Assessment
Scenario
You are a security consultant hired to assess the physical security of Greenfield Community Library. The library is open to the public from 8 AM to 9 PM daily. During your assessment, you observe the following:
• The server room containing the library’s patron database (names, addresses, library card numbers) is located in the basement. The door has a standard key lock, and the key is kept at the front circulation desk in an unlabeled drawer.
• The basement hallway leading to the server room has no cameras or motion sensors.
• Library staff use a shared computer at the circulation desk. The computer remains logged in throughout the day and is never locked when staff step away. The computer connects to the same network as the server.
• The library’s Wi-Fi network is open (no password required) and uses the SSID “Greenfield-Library.”
• A recently posted sign near the entrance reads: “Free Wi-Fi! Network: Greenfield-Library”
(a) Identify THREE distinct physical or security vulnerabilities from the scenario above. For each vulnerability, explain what asset is at risk and how an adversary could exploit it. (3 points)
Sample Response
Vulnerability 1: The server room key is kept in an unlabeled drawer at a public-facing desk. An adversary could observe staff accessing the drawer (shoulder surfing) or access the drawer when staff step away, gaining physical access to the server room and the patron database (compromising confidentiality of patron data).
Vulnerability 2: The circulation desk computer remains logged in and unlocked when staff step away. An adversary posing as a patron could access the computer and potentially reach the patron database or other internal systems through the shared network connection (compromising confidentiality and integrity of data).
Vulnerability 3: The open Wi-Fi network with a publicly advertised SSID creates an opportunity for an adversary to set up an evil twin access point with the same or similar SSID. Patrons could unknowingly connect to the adversary’s network, allowing the adversary to capture their traffic including login credentials (compromising patron confidentiality).
(b) For each vulnerability identified in part (a), recommend a specific security control and classify it as physical, technical, or managerial. Explain how each control mitigates the associated risk. (3 points)
Sample Response
For Vulnerability 1: Replace the standard key lock with an electronic badge reader that logs entries (physical control). This prevents unauthorized access because only authorized badges grant entry, and all access is recorded for investigation.
For Vulnerability 2: Implement a workstation security policy requiring staff to lock computers before leaving them unattended, with automatic screen lock after 2 minutes of inactivity (managerial control for the policy; technical control for the auto-lock setting). This prevents unauthorized access to the logged-in session.
For Vulnerability 3: Enable WPA3 encryption on the library’s wireless network and require a password to join (technical control). This makes it harder for adversaries to create convincing evil twin networks because the legitimate network requires authentication. Additionally, disable SSID beacon broadcasting to make the network less discoverable.
(c) Explain why a defense-in-depth strategy is important for the library’s server room specifically, and describe how at least TWO layers of defense would work together. (2 points)
Sample Response
Defense-in-depth uses multiple layers of security controls so that if one layer is bypassed, another still protects the asset. For the server room:
Layer 1 — Physical: An electronic badge reader on the server room door controls who can enter, and only authorized IT staff badges are programmed for access.
Layer 2 — Detective: A camera in the hallway leading to the server room records all activity, providing both a deterrent and evidence for investigation if a breach occurs.
These layers work together: even if an adversary clones a badge (bypassing Layer 1), the camera (Layer 2) captures their entry, enabling detection and response. No single control is sufficient because each can be defeated individually — defense-in-depth provides resilience through redundancy.
Free Response Question 2 · Unit 3
Network Security Configuration
Scenario
You are a network security engineer at Coastal Medical Group, a healthcare organization with two networks:
• Internal Network: Contains the Electronic Health Records (EHR) server, employee workstations, and a file server with patient billing data.
• Public Network Segment: Contains a web server that allows patients to schedule appointments and view test results online.
Currently, both networks share a single firewall with the following ACL rules (in order):
Rule 1: ALLOW inbound TCP port 443 from ALL
Rule 2: ALLOW inbound TCP port 80 from ALL
Rule 3: ALLOW inbound TCP port 22 from ALL
Rule 4: DENY inbound TCP ALL from ALL
The organization has experienced unauthorized SSH login attempts from external IP addresses targeting the EHR server.
(a) Identify TWO network security vulnerabilities in the current configuration that could put patient data at risk. For each vulnerability, explain the potential impact. (2 points)
Sample Response
Vulnerability 1: Rule 3 allows SSH (port 22) from ALL sources, including external IP addresses. This means anyone on the internet can attempt to log in to internal servers via SSH, which is how the unauthorized login attempts against the EHR server are occurring. The potential impact is unauthorized access to patient health records (compromising confidentiality and integrity).
Vulnerability 2: The public web server and the internal EHR/billing servers share the same network without segmentation. If an adversary compromises the web server (which is exposed to the public), they can move laterally to the internal network and access sensitive patient data. This violates the principle of network segmentation and defense-in-depth.
(b) Rewrite the firewall ACL rules to address the vulnerabilities you identified. Your new rules should allow patients to access the web server, restrict SSH to the internal network only, and deny all other inbound traffic. Write the rules in order. (3 points)
Sample Response
Revised ACL Rules (in order):
Rule 1: ALLOW inbound TCP port 443 from ALL
Rule 2: ALLOW inbound TCP port 80 from ALL
Rule 3: ALLOW inbound TCP port 22 from 10.0.0.0/8
Rule 4: DENY inbound TCP ALL from ALL
The key change is Rule 3: SSH is now restricted to the internal subnet (10.0.0.0/8 as an example) instead of ALL sources. This blocks external SSH attempts while allowing internal administrators to manage servers. Rules 1 and 2 remain unchanged because patients need public access to the web server via HTTPS and HTTP. Rule 4 denies all other traffic.
(c) Recommend a network architecture change that would further protect the EHR server, and explain which detection tool you would deploy to monitor for attacks on the internal network. Justify your choices. (3 points)
Sample Response
Architecture change: Create a screened subnet (DMZ) for the public web server, placing it between two firewalls — one facing the internet and one facing the internal network. The EHR server and billing data remain on the internal network behind the second firewall. This ensures that even if the web server is compromised, the adversary still faces an additional firewall before reaching patient data.
Detection tool: Deploy a SIEM (Security Information and Event Management) system on the internal network. A SIEM collects and analyzes data from multiple sources (firewalls, server logs, IDS alerts, application logs) to detect patterns that may indicate a cyberattack. For a healthcare environment with sensitive patient data, SIEM provides the comprehensive monitoring needed to detect lateral movement, unauthorized access attempts, and data exfiltration. The consistent traffic patterns of a medical office make anomaly-based detection within the SIEM effective for identifying unusual activity.
Free Response Question 3 · Units 4–5
Device Compromise Investigation
Scenario
You are a forensic analyst at a financial services company. The security team has detected suspicious activity on the network and has asked you to investigate. They provide you with the following evidence from an employee workstation (Workstation-47):
Authentication Log (excerpt):
03-07 08:15:22 jsmith Login SUCCESS Workstation-47
03-07 08:17:05 jsmith Login SUCCESS FileServer-02
03-07 12:30:00 jsmith Logout SUCCESS Workstation-47
03-07 23:41:12 admin Login FAIL Workstation-47
03-07 23:41:18 admin Login FAIL Workstation-47
03-07 23:41:25 admin Login FAIL Workstation-47
03-07 23:41:33 admin Login FAIL Workstation-47
03-07 23:42:01 admin Login SUCCESS Workstation-47
03-07 23:43:17 admin Login SUCCESS FileServer-02
03-07 23:44:55 admin Login SUCCESS EHR-Server-01
03-08 00:12:33 admin Logout SUCCESS EHR-Server-01
Additional findings: No malware files were found on Workstation-47’s hard drive, but memory analysis reveals unknown code running in RAM that is communicating with an external IP address. The company’s passwords are hashed with SHA-256 but are not salted.
(a) Analyze the authentication log and identify at least THREE indicators of compromise (IoCs). For each IoC, explain why it is suspicious. (3 points)
Sample Response
IoC 1: Four rapid failed login attempts for the “admin” account at 23:41 (within 21 seconds) followed by a successful login at 23:42. This pattern indicates an automated online password attack (likely brute force or dictionary attack) that eventually succeeded.
IoC 2: The admin login occurred at 23:41 (11:41 PM), which is well outside normal business hours. Login attempts at unusual times are a recognized indicator of an attack per the course framework.
IoC 3: After gaining access to Workstation-47 with the admin account, the adversary logged into FileServer-02 and EHR-Server-01 within minutes. This is evidence of lateral movement — the adversary escalated privileges by compromising an admin account and used it to access more sensitive systems.
(b) Based on the additional findings, identify the type of malware present on Workstation-47 and explain why the company’s password storage practice made the attack easier. Recommend a specific improvement. (3 points)
Sample Response
Malware type: The evidence describes fileless malware — no malicious files were found on disk, but unknown code was detected running in RAM and communicating with an external IP. Fileless malware uses legitimate system programs to operate and is harder to detect because it leaves no files for traditional anti-malware to scan.
Password storage weakness: The passwords are hashed with SHA-256 but are not salted. Without salt, if two users have the same password, their hashes are identical. An adversary who captures the hash database can use a rainbow table attack to efficiently match common passwords to their pre-computed hashes. The admin password was likely a common password that appeared in the adversary’s rainbow table.
Recommendation: Implement salting — add a unique random salt to each user’s password before hashing. This ensures every hash is unique (even for identical passwords), making rainbow table attacks ineffective because the adversary would need a separate table for every possible salt value.
(c) Map the adversary’s actions to the phases of a cyberattack described in the course framework. Identify at least THREE phases evident in this scenario. (2 points)
Sample Response
Phase 1 — Initial Access: The adversary gained a foothold on Workstation-47 by successfully compromising the admin account through an online password attack (the failed-then-successful login pattern).
Phase 2 — Persistence: The fileless malware running in RAM and communicating with an external IP suggests a command and control (C2) channel. The adversary established persistent access to send commands and receive output from the compromised workstation.
Phase 3 — Lateral Movement: After compromising Workstation-47, the adversary used the admin credentials to log into FileServer-02 and EHR-Server-01, escalating access to increasingly sensitive systems (financial files and health records).
Phase 4 — Taking Action: The 29-minute session on EHR-Server-01 (23:44 to 00:12) suggests the adversary was collecting or exfiltrating targeted data from the health records server.
How Did You Do?
Your MCQ score is tracked above. For the FRQs, compare your written responses to the sample answers and assess your own performance honestly.
35–40 MCQ correct: Excellent. You have strong command of all five units. Focus remaining study on any topics where you missed questions.
28–34 MCQ correct: Good foundation. Review the unit study guides for the units where you scored lowest and practice more scenario-based questions.
20–27 MCQ correct: Solid start but significant gaps remain. Work through our complete study guide unit by unit and retake this exam after review.
Below 20: Focus on building foundational understanding. Start with Unit 1 in our structured course and work through each unit’s study guide, exercises, and quizzes before retaking this exam.
Related Resources
📄 Exam Format Guide
Sections, skills, Bluebook, credential details, and AP Cyber vs CSP comparison.
📚 Complete Study Guide
All 5 units, 220+ key terms, exam strategies, and unit-by-unit breakdowns.
✍ 15-Question Sampler
Quick 15-question practice set covering all 5 units with explanations.
📚 Full AP Cyber Course
Lessons, exercises, quizzes, unit exams — the complete structured course.
AP® is a registered trademark of the College Board, which was not involved in the production of this resource.
Get in Touch
Whether you're a student, parent, or teacher — I'd love to hear from you.
Just want free AP CS resources?
Enter your email below and check the subscribe box — no message needed. Students get daily practice questions and study tips. Teachers get curriculum resources and teaching strategies.
Message Sent!
Thanks for reaching out. I'll get back to you within 24 hours.
tanner@apcsexamprep.com
Courses
AP CSA, CSP, & Cybersecurity
Response Time
Within 24 hours
Prefer email? Reach me directly at tanner@apcsexamprep.com