1. What is the primary benefit of conducting a penetration test on an
application?
• A) To identify potential vulnerabilities
• B) To increase application speed
• C) To assess user experience
• Answer: A) To identify potential vulnerabilities
• Explanation: Penetration testing simulates attacks to identify security weaknesses before they
can be exploited.
2. Which security control aims to prevent unauthorized data access by requiring
identity verification?
• A) Encryption
• B) Authentication
• C) Load balancing
• Answer: B) Authentication
• Explanation: Authentication verifies user identity, ensuring that only authorized users can
access the system.
3. Which of the following is essential to ensure the authenticity and integrity of a
message?
• A) Data masking
• B) Digital signatures
• C) Tokenization
• Answer: B) Digital signatures
• Explanation: Digital signatures confirm the sender’s identity and verify that the message has not
been altered.
4. What is the purpose of endpoint detection and response (EDR) systems?
• A) To enhance network speed
• B) To detect and respond to security incidents on endpoints
• C) To monitor application performance
• Answer: B) To detect and respond to security incidents on endpoints
• Explanation: EDR solutions provide real-time monitoring and response capabilities for endpoint
devices.
5. Which of the following is commonly used to secure REST API
communications?
, • A) SSL/TLS
• B) UDP
• C) HTTP
• Answer: A) SSL/TLS
• Explanation: SSL/TLS provides encryption, ensuring secure communication between client and
server in REST APIs.
6. Which access control method is based on roles assigned to users?
• A) Discretionary Access Control (DAC)
• B) Role-Based Access Control (RBAC)
• C) Mandatory Access Control (MAC)
• Answer: B) Role-Based Access Control (RBAC)
• Explanation: RBAC restricts access based on users' roles within an organization, streamlining
permissions management.
7. What is the primary purpose of a honeypot in security architecture?
• A) To trap and analyze attackers' behavior
• B) To encrypt data at rest
• C) To improve application performance
• Answer: A) To trap and analyze attackers' behavior
• Explanation: Honeypots attract attackers, allowing defenders to observe tactics and techniques
in a controlled environment.
8. What does the concept of “defense in depth” emphasize in security
architecture?
• A) Single layer protection
• B) Multiple layers of security controls
• C) Increased system redundancy
• Answer: B) Multiple layers of security controls
• Explanation: Defense in depth uses multiple layers of defense to reduce the chance of a
successful attack.
9. Which technology encrypts data to protect its confidentiality over a network?
• A) Firewall
• B) VPN
• C) Switch
• Answer: B) VPN
• Explanation: VPNs use encryption to secure data in transit, maintaining confidentiality over
public or shared networks.
10. What type of malware restricts access to data or systems by encrypting them
until a ransom is paid?