AP Cybersecurity Unit 1 Exam | Introduction to Security (20 Questions)
Unit 1 Exam: Introduction to Security
20 questions covering all Unit 1 topics — Social Engineering, Password Attacks, AI Threats, and Wireless Security
(A) This describes exploitation of a software vulnerability, a technical attack unrelated to human manipulation.
(C) This describes a man-in-the-middle or eavesdropping attack, not social engineering.
(D) This describes a denial-of-service (DoS) attack targeting infrastructure availability.
(A) Phishing uses email; this attack occurs over a phone call, making vishing the correct channel term.
(C) Brute-force attacks are automated technical attempts; no human deception is involved.
(D) MitM intercepts existing communications; it does not involve tricking someone into revealing a password directly.
(A) Correct policy — length is the single most important password strength factor.
(C) Correct policy — preventing reuse stops predictable password cycling.
(D) Correct policy — MFA on admin accounts is a critical control.
I. Setting up a rogue access point with an SSID that mimics a legitimate nearby network
II. Using packet sniffers to capture unencrypted data transmitted over the network
III. Physically destroying the legitimate router to force users onto the attacker’s network
(B) Incorrect — physical destruction is not a standard wireless attack technique on the AP exam.
(D) Incorrect — Statement III is not a realistic wireless attack scenario tested by AP Cybersecurity.
(A) Threat generation is an offensive technique used in penetration testing, not log analysis.
(C) Encryption protects data confidentiality; it has no connection to detecting login anomalies.
(D) Social engineering simulations train employees on recognizing attacks, not on log analysis.
(A) Phishing uses deceptive digital communications, not physical presence.
(C) Shoulder surfing involves observing someone’s screen or keystrokes, not bypassing door access.
(D) Dumpster diving involves searching through discarded physical items for sensitive information.
(A) Incorrect — two different factor categories are used, making this MFA not single-factor.
(C) Incorrect — “something you are” refers to biometrics; an SMS is “something you have.”
(D) Incorrect — an SMS code is “something you have,” not something you know.
I. Training employees to verify sender domains before clicking links
II. Deploying email filters that flag messages containing external links
III. Requiring employees to use longer passwords on all accounts
(A) Incomplete — email filtering (II) is also an effective anti-phishing control.
(D) Incorrect — password length (III) does not address the social engineering vector of phishing.
(A) Adversarial ML manipulates AI model inputs/outputs; it doesn’t describe generating fake voice audio.
(C) Ransomware is malware that encrypts victim data and demands payment; no voice synthesis involved.
(D) Packet injection is a network-layer attack unrelated to audio impersonation.
(A) True — behavioral analysis (heuristics) allows AI to detect zero-day malware it hasn’t seen before.
(B) True — automated response (SOAR) is faster than manual analyst workflows.
(D) True — AI’s ability to process large volumes of log data simultaneously is a core security advantage.
(A) DDoS makes a service unavailable; it doesn’t involve impersonating a Wi-Fi network.
(C) DNS poisoning manipulates domain resolution records, not wireless access points.
(D) SQL injection exploits web application input validation; it is unrelated to wireless networks.
I. Implementing a call-back verification procedure before fulfilling unusual requests
II. Training employees to recognize urgency and authority as social engineering triggers
III. Installing the latest operating system security patches
(C) Incorrect — OS patches address software vulnerabilities; they do not prevent an employee from being deceived.
(D) Incomplete — patching alone does nothing to counter social engineering techniques.
(A) Generic phishing is untargeted; this attack used specific research to personalize the message.
(B) Smishing uses text messages as the delivery channel, not email.
(D) Whaling specifically targets C-level executives; the scenario describes a general employee.
(A) Brute-force generates combinations; it doesn’t rely on a stolen credential list.
(B) Dictionary attacks use common password wordlists, not real stolen credentials from a specific breach.
(D) Rainbow tables target password hashes; credential stuffing tests plaintext credentials against live logins.
(A) Overstates protection — SSL stripping and certificate-based MitM attacks can defeat HTTPS in some configurations.
(C) Exaggerates the attack; code injection via a rogue AP is a separate, more complex attack not implied here.
(D) Fundamentally wrong — HTTPS encrypts data in transit, which is exactly the protection relevant here.
(A) Correct definition of vulnerability.
(B) Correct definition of threat.
(C) Correct definition of risk (likelihood x impact framework).
(A) A stronger Wi-Fi password prevents unauthorized connections to your own network; it doesn’t protect you on someone else’s rogue network.
(C) Bluetooth is a separate radio technology; disabling it has no effect on Wi-Fi interception.
(D) Cookies are stored session tokens; clearing them does not encrypt or protect network traffic.
I. AI can enable attackers to scale spear phishing attacks that previously required manual research.
II. AI-powered security tools can reduce mean time to detect (MTTD) threats compared to manual analysis.
III. AI completely eliminates the need for human security analysts in a modern SOC.
(D) Incorrect — Statement III overstates AI capabilities; human analysts remain essential for judgment and context.
(A) Two PINs or two passwords are the same factor category; this would not be true MFA.
(B) “Something you have” is a physical device (phone, card, token); a fingerprint is biometric.
(D) Incorrect — the PIN is a known secret, not a physical possession.
(A) Forced 30-day rotation is counterproductive per NIST; this combination also doesn’t address wireless threats.
(C) Antivirus and firewalls protect against malware and network intrusion but don’t defend against human manipulation or rogue APs.
(D) Disk encryption and USB controls address data loss; neither prevents phishing or Wi-Fi interception.
Get in Touch
Whether you're a student, parent, or teacher — I'd love to hear from you.
Just want free AP CS resources?
Enter your email below and check the subscribe box — no message needed. Students get daily practice questions and study tips. Teachers get curriculum resources and teaching strategies.
Message Sent!
Thanks for reaching out. I'll get back to you within 24 hours.
tanner@apcsexamprep.com
Courses
AP CSA, CSP, & Cybersecurity
Response Time
Within 24 hours
Prefer email? Reach me directly at tanner@apcsexamprep.com