Security

What is the purpose of encryption in data security?
a. To protect data from unauthorized access by converting it into unreadable format
b. To speed up data transmission
c. To manage user sessions
d. To authenticate users

Answer: a. To protect data from unauthorized access by converting it into unreadable format

Which of the following is an example of a symmetric encryption algorithm?
a. AES (Advanced Encryption Standard)
b. RSA (Rivest-Shamir-Adleman)
c. DSA (Digital Signature Algorithm)
d. ECC (Elliptic Curve Cryptography)

Answer: a. AES (Advanced Encryption Standard)

What is the main difference between symmetric and asymmetric encryption?
a. Symmetric encryption uses the same key for encryption and decryption, while asymmetric uses a pair of keys
b. Symmetric encryption is slower than asymmetric encryption
c. Asymmetric encryption is used for data at rest, while symmetric is for data in transit
d. Asymmetric encryption is less secure than symmetric encryption

Answer: a. Symmetric encryption uses the same key for encryption and decryption, while asymmetric uses a pair of keys

What does MFA (Multi-Factor Authentication) require?
a. Two or more verification methods to access an account
b. A single password to access multiple systems
c. A username and password only
d. A biometric scan only

Answer: a. Two or more verification methods to access an account

Which of the following is a common type of attack that exploits a vulnerability in software?
a. SQL Injection
b. Data Encryption
c. Firewall
d. Antivirus

Answer: a. SQL Injection

What is the purpose of a firewall in network security?
a. To monitor and control incoming and outgoing network traffic based on security rules
b. To encrypt data stored on the server
c. To authenticate users accessing the network
d. To create backups of critical data

Answer: a. To monitor and control incoming and outgoing network traffic based on security rules

Which security practice involves verifying the identity of users before granting access?
a. Authentication
b. Authorization
c. Encryption
d. Integrity

Answer: a. Authentication

What is the purpose of hashing in security?
a. To create a unique, fixed-size representation of data
b. To encrypt data for secure transmission
c. To manage user permissions
d. To authenticate user credentials

Answer: a. To create a unique, fixed-size representation of data

Which protocol is commonly used to secure web traffic?
a. HTTPS (HyperText Transfer Protocol Secure)
b. FTP (File Transfer Protocol)
c. HTTP (HyperText Transfer Protocol)
d. SMTP (Simple Mail Transfer Protocol)

Answer: a. HTTPS (HyperText Transfer Protocol Secure)

What is the purpose of an intrusion detection system (IDS)?
a. To detect and alert on suspicious activities or security breaches
b. To prevent unauthorized access to a network
c. To encrypt sensitive data
d. To manage user sessions

Answer: a. To detect and alert on suspicious activities or security breaches

What does the principle of least privilege entail?
a. Granting users only the permissions they need to perform their job functions
b. Providing unrestricted access to all users
c. Restricting access based on user roles
d. Ensuring that all users have the same level of access

Answer: a. Granting users only the permissions they need to perform their job functions

Which of the following is a technique used to protect against cross-site scripting (XSS) attacks?
a. Input validation and escaping
b. Using encryption algorithms
c. Implementing multi-factor authentication
d. Setting up firewalls

Answer: a. Input validation and escaping

What is the purpose of a VPN (Virtual Private Network)?
a. To create a secure, encrypted connection over a less secure network
b. To manage user authentication
c. To encrypt data at rest
d. To monitor network traffic

Answer: a. To create a secure, encrypted connection over a less secure network

What does a digital signature provide?
a. Authentication and integrity for a digital message or document
b. Encryption of data in transit
c. Backup of data
d. User authentication

Answer: a. Authentication and integrity for a digital message or document

Which of the following is a common practice for securing passwords?
a. Using a combination of letters, numbers, and special characters
b. Storing passwords in plaintext
c. Reusing passwords across multiple accounts
d. Sharing passwords with colleagues

Answer: a. Using a combination of letters, numbers, and special characters

What is the purpose of a security patch?
a. To fix vulnerabilities and improve security in software
b. To enhance the user interface
c. To manage network traffic
d. To back up data

Answer: a. To fix vulnerabilities and improve security in software

Which security concept involves verifying that data has not been altered during transmission?
a. Data Integrity
b. Data Encryption
c. Access Control
d. Authentication

Answer: a. Data Integrity

What is an SQL Injection attack?
a. An attack that exploits vulnerabilities in a web application’s database layer
b. A technique for encrypting database connections
c. A method for managing user access
d. A type of denial-of-service attack

Answer: a. An attack that exploits vulnerabilities in a web application’s database layer

What is the purpose of access control lists (ACLs)?
a. To specify which users or systems are allowed to access certain resources
b. To encrypt sensitive data
c. To monitor network traffic
d. To authenticate users

Answer: a. To specify which users or systems are allowed to access certain resources

Which security measure helps to ensure that unauthorized users cannot access sensitive data?
a. Encryption
b. Backup
c. Monitoring
d. Patching

Answer: a. Encryption

What is the purpose of a security audit?
a. To assess and improve an organization’s security posture
b. To encrypt data
c. To manage network traffic
d. To handle user authentication

Answer: a. To assess and improve an organization’s security posture

Which of the following is a common method for protecting data at rest?
a. Encryption
b. Intrusion detection
c. Firewall
d. VPN

Answer: a. Encryption

What is a common way to protect against man-in-the-middle attacks?
a. Using encryption protocols like HTTPS
b. Implementing user authentication
c. Setting up a firewall
d. Managing access controls

Answer: a. Using encryption protocols like HTTPS

What is the role of a security policy in an organization?
a. To define the rules and guidelines for maintaining security
b. To manage user authentication
c. To handle network traffic
d. To back up data

Answer: a. To define the rules and guidelines for maintaining security

What does the term “zero trust” refer to in cybersecurity?
a. The concept of never trusting any entity and always verifying access requests
b. Allowing unrestricted access to all network resources
c. Trusting internal users by default
d. Ignoring external security threats

Answer: a. The concept of never trusting any entity and always verifying access requests

Which of the following is NOT a type of malware?
a. Firewall
b. Virus
c. Trojan
d. Ransomware

Answer: a. Firewall

What is the purpose of a security token?
a. To provide an additional layer of security by verifying user identity
b. To manage network traffic
c. To encrypt data
d. To handle session state

Answer: a. To provide an additional layer of security by verifying user identity

Which protocol is used to secure email communications?
a. S/MIME (Secure/Multipurpose Internet Mail Extensions)
b. HTTP
c. FTP
d. SNMP

Answer: a. S/MIME (Secure/Multipurpose Internet Mail Extensions)

What is the function of a honeypot in cybersecurity?
a. To attract and detect malicious activity for analysis
b. To manage user authentication
c. To encrypt data
d. To handle network traffic

Answer: a. To attract and detect malicious activity for analysis

What does the term “phishing” refer to?
a. A type of social engineering attack to steal sensitive information
b. An encryption method for secure communication
c. A tool for monitoring network traffic
d. A technique for managing user sessions

Answer: a. A type of social engineering attack to steal sensitive information

What is the purpose of a security incident response plan?
a. To outline procedures for responding to and managing security breaches
b. To manage network traffic
c. To authenticate users
d. To encrypt data

Answer: a. To outline procedures for responding to and managing security breaches

Which of the following is a common way to prevent unauthorized access to physical locations?
a. Using access control systems such as key cards and biometric scanners
b. Encrypting physical documents
c. Managing digital data backups
d. Implementing firewalls

Answer: a. Using access control systems such as key cards and biometric scanners

What is the main goal of data masking?
a. To obfuscate sensitive data to protect it from unauthorized access
b. To enhance network speed
c. To manage user sessions
d. To handle encryption keys

Answer: a. To obfuscate sensitive data to protect it from unauthorized access

Which of the following is a technique used to safeguard against DDoS (Distributed Denial of Service) attacks?
a. Implementing rate limiting and traffic analysis
b. Encrypting data in transit
c. Managing user permissions
d. Setting up a firewall

Answer: a. Implementing rate limiting and traffic analysis

What is the purpose of a public key infrastructure (PKI)?
a. To manage digital certificates and encryption keys for secure communication
b. To monitor network traffic
c. To manage user sessions
d. To handle data backups

Answer: a. To manage digital certificates and encryption keys for secure communication

What is the function of a digital certificate?
a. To verify the identity of a user, device, or server in digital communications
b. To encrypt data
c. To manage network traffic
d. To handle session state

Answer: a. To verify the identity of a user, device, or server in digital communications

What is a common approach to managing security vulnerabilities in software?
a. Regularly applying security patches and updates
b. Rewriting code from scratch
c. Ignoring minor vulnerabilities
d. Using outdated security protocols

Answer: a. Regularly applying security patches and updates

What does the term “social engineering” refer to in the context of security?
a. Manipulating individuals into divulging confidential information
b. Implementing encryption algorithms
c. Setting up firewalls
d. Managing network traffic

Answer: a. Manipulating individuals into divulging confidential information

Which of the following is a practice for securing web applications?
a. Regular security testing and code reviews
b. Ignoring user input validation
c. Using default settings
d. Disabling security features

Answer: a. Regular security testing and code reviews

What is the purpose of a security audit trail?
a. To record and track user activities for auditing and forensic purposes
b. To encrypt sensitive data
c. To handle user sessions
d. To manage network traffic

Answer: a. To record and track user activities for auditing and forensic purposes

What is the main benefit of using HTTPS over HTTP?
a. HTTPS provides encryption for secure data transmission
b. HTTP is faster than HTTPS
c. HTTPS requires less configuration
d. HTTP is more secure than HTTPS

Answer: a. HTTPS provides encryption for secure data transmission

What does the term “zero-day vulnerability” refer to?
a. A previously unknown vulnerability that has no available patch
b. A security flaw with a known fix
c. A vulnerability that occurs after a software update
d. A vulnerability that is easy to exploit

Answer: a. A previously unknown vulnerability that has no available patch

What is the purpose of a security token in multi-factor authentication?
a. To provide a second layer of verification in addition to passwords
b. To encrypt data
c. To manage network traffic
d. To handle user sessions

Answer: a. To provide a second layer of verification in addition to passwords

What is an example of a secure practice for handling sensitive information?
a. Encrypting data both in transit and at rest
b. Storing data in plaintext
c. Sharing passwords over email
d. Using default encryption keys

Answer: a. Encrypting data both in transit and at rest

Which of the following is a type of attack that involves intercepting communication between two parties?
a. Man-in-the-Middle attack
b. Phishing
c. SQL Injection
d. Denial-of-Service attack

Answer: a. Man-in-the-Middle attack