Exam Review Questions | Latest Version
| 2024/2025 | Rated A+
Which of the following is considered a physical security measure?
A) Password policies
B) Firewalls
C) Security cameras
D) Encryption
✔✔ C) Security cameras
What does the principle of least privilege imply?
A) Users should have unrestricted access to all information
B) Users should have the minimum level of access necessary to perform their duties
C) Users should be able to access data anytime
D) Users should be allowed to share their credentials
✔✔ B) Users should have the minimum level of access necessary to perform their duties
Which of the following best describes a threat in information security?
1
,A) A security control designed to prevent unauthorized access
B) A potential cause of an unwanted incident, which may result in harm
C) A security policy that outlines user behavior
D) A software that monitors network traffic
✔✔ B) A potential cause of an unwanted incident, which may result in harm
What type of malware is designed to replicate itself and spread to other computers?
A) Trojan
B) Worm
C) Virus
D) Ransomware
✔✔ B) Worm
Which of the following is a method used to ensure data integrity?
A) Authentication
B) Encryption
C) Hashing
D) Backups
2
,✔✔ C) Hashing
What is the purpose of an intrusion detection system (IDS)?
A) To prevent unauthorized access to a network
B) To monitor network traffic for suspicious activity and alerts administrators
C) To encrypt sensitive data
D) To manage user authentication
✔✔ B) To monitor network traffic for suspicious activity and alerts administrators
What does the acronym CIA stand for in the context of information security?
A) Confidentiality, Integrity, Availability
B) Control, Integrity, Access
C) Cybersecurity, Information, Assurance
D) Confidentiality, Inspection, Authentication
✔✔ A) Confidentiality, Integrity, Availability
Which type of attack involves intercepting and altering communications between two parties?
A) Phishing
3
, B) Man-in-the-middle
C) Denial-of-Service
D) Social Engineering
✔✔ B) Man-in-the-middle
What is the main purpose of a firewall?
A) To manage network traffic
B) To encrypt sensitive information
C) To monitor user activity
D) To block unauthorized access to a network
✔✔ D) To block unauthorized access to a network
Which of the following is a common form of social engineering?
A) SQL Injection
B) Phishing
C) Ransomware
D) DDoS attack
✔✔ B) Phishing
4