AP Cybersecurity Unit 1 Exam | Introduction to Security (20 Questions)

AP Cyber Hub Unit 1 1.1 Lesson Ex 1 Ex 2 Lab Quiz 1.2 Lesson Ex 1 Ex 2 Lab Quiz 1.3 Lesson Ex 1 Ex 2 Lab Quiz 1.4 Lesson Ex 1 Ex 2 Lab Quiz 1.5 Lesson Ex 1 Ex 2 Lab Quiz
Unit 1 • End-of-Unit Exam

Unit 1 Exam: Introduction to Security

20 questions covering all Unit 1 topics — Social Engineering, Password Attacks, AI Threats, and Wireless Security

Score: 0 / 0 Answer each question individually to see feedback
Exam Instructions: Predict your answer before selecting an option. Use “slash the trash” — eliminate obviously wrong choices first. Key words are bolded and underlined.
Q1 Social Engineering
Which of the following BEST describes social engineering in the context of cybersecurity?
Q2 Attack Types
A caller claims to be from the company’s IT department and tells an employee their account has been compromised. The caller asks the employee to read back their current password so it can be “verified and reset.” This is MOST LIKELY an example of:
Q3 Password Security
A company publishes the following password policy. Which rule is INCORRECT and would actually REDUCE security?
Q4 Wireless Security
Which of the following represent techniques attackers use to exploit users on public Wi-Fi networks?

I. Setting up a rogue access point with an SSID that mimics a legitimate nearby network
II. Using packet sniffers to capture unencrypted data transmitted over the network
III. Physically destroying the legitimate router to force users onto the attacker’s network
Q5 AI in Cyber Defense
A security operations center deploys an AI system that monitors network logs and automatically flags unusual login patterns at 3 AM from foreign IP addresses. This is an example of AI being used for:
⎯ Part 2: Physical & Wireless Security ⎯
Q6 Physical Social Engineering
An attacker carries a large stack of boxes and waits near a secure door. When an authorized employee badges in, the attacker says “Could you hold that? My hands are full.” The employee holds the door open. This attack is called:
Q7 Authentication
A user logs into a system by entering a password and then receiving a one-time code via SMS that must also be entered. This authentication method is BEST described as:
Q8 Phishing Defense
A company wants to reduce the risk of employees falling for phishing attacks. Which of the following measures would be effective?

I. Training employees to verify sender domains before clicking links
II. Deploying email filters that flag messages containing external links
III. Requiring employees to use longer passwords on all accounts
Q9 AI-Based Attacks
An attacker uses AI to generate a convincing audio clip of a CEO’s voice instructing the CFO to wire funds to a new account. The CFO complies. Which term BEST describes the AI technique used?
Q10 AI Defense
A cybersecurity consultant makes four claims about using AI in cyber defense. Which claim is INCORRECT?
⎯ Part 3: Wireless Attacks ⎯
Q11 Wireless Security
A coffee shop’s legitimate network is named “CafeWifi.” An attacker nearby creates a network also named “CafeWifi” with a stronger signal. Customers connect to the attacker’s network thinking it is legitimate. This type of attack is called:
Q12 Defense Strategies
Which of the following are effective defenses against social engineering attacks?

I. Implementing a call-back verification procedure before fulfilling unusual requests
II. Training employees to recognize urgency and authority as social engineering triggers
III. Installing the latest operating system security patches
Q13 Phishing Variants
A threat actor researches a target company on LinkedIn, identifies a specific employee’s name, role, and recent project, then sends that employee a tailored email referencing those details to appear credible. This attack is BEST described as:
Q14 Password Attacks
A data breach at an online retailer exposes millions of username/password pairs. An attacker downloads this list and automatically tries each pair against a major bank’s login portal. This attack is called:
Q15 Wireless + Encryption
A user connects to a rogue Wi-Fi access point and visits their bank’s website, which uses HTTPS. An attacker monitoring the rogue AP attempts to read the transmitted data. Which statement is MOST ACCURATE?
⎯ Part 4: Defense Strategies ⎯
Q16 Terminology
A student creates a study guide with the following definitions. Which definition is INCORRECT?
Q17 Wireless Defense
Which of the following BEST protects a user from an evil twin (rogue access point) attack when using public Wi-Fi?
Q18 AI: Benefits and Risks
Consider the following statements about AI in cybersecurity.

I. AI can enable attackers to scale spear phishing attacks that previously required manual research.
II. AI-powered security tools can reduce mean time to detect (MTTD) threats compared to manual analysis.
III. AI completely eliminates the need for human security analysts in a modern SOC.
Q19 Authentication
An employee authenticates to a corporate system using a PIN (entered on a keypad) and a fingerprint scan. This represents authentication using:
Q20 Defense in Depth
A security manager wants to protect employees from the widest range of Unit 1 threats (social engineering, password attacks, and wireless risks). Which combination of controls is MOST COMPREHENSIVE?
Unit 1 Exam Complete
out of 20
Back to Course Hub Review Unit 1 Guide →

Get in Touch

Whether you're a student, parent, or teacher — I'd love to hear from you.

Just want free AP CS resources?

Enter your email below and check the subscribe box — no message needed. Students get daily practice questions and study tips. Teachers get curriculum resources and teaching strategies.

Typically responds within 24 hours

Message Sent!

Thanks for reaching out. I'll get back to you within 24 hours.

🏫 Welcome, fellow educator!

I offer curriculum resources, practice materials, and study guides designed for AP CS teachers. Let me know what you're looking for — whether it's classroom materials, a guest speaker, or Teachers Pay Teachers resources.

Email

tanner@apcsexamprep.com

📚

Courses

AP CSA, CSP, & Cybersecurity

Response Time

Within 24 hours

Prefer email? Reach me directly at tanner@apcsexamprep.com