Practice Questions with Detailed Rationales
latest 2026 Latest version Q&A |INSTANT
DOWNLOAD PDF
1. Which of the following is considered a form of social engineering?
A. Phishing emails
B. Firewall configuration
C. Shoulder surfing
D. Using strong passwords
*Answer: A, C — Phishing and shoulder surfing manipulate humans to
gain confidential information, while firewalls and strong passwords are
protective measures.
2. In the context of encryption, what does AES stand for?
A. Advanced Encryption Standard
B. Automatic Encoding System
C. Algorithmic Encryption Service
D. Authenticated Encryption Software
*Answer: A — AES is a widely used symmetric encryption standard for
securing data.
3. What is a zero-day vulnerability?
A. A flaw that has been publicly patched
B. A software vulnerability unknown to developers
C. A scheduled software update
D. A type of firewall
*Answer: B — Zero-day vulnerabilities are unknown to developers and
can be exploited before a patch exists.
,4. In information security, what is multi-factor authentication (MFA)?
A. Using multiple passwords
B. Combining two or more verification methods
C. Encrypting all messages
D. Installing multiple firewalls
*Answer: B — MFA improves security by requiring multiple types of
authentication (e.g., password + fingerprint).
5. Which of these is a principle of the CIA triad in cybersecurity?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
*Answer: A, B, C — The CIA triad ensures data is confidential, accurate,
and accessible when needed.
6. In a made-up language “Zyra,” if the word flom means “fire” and
dren means “water,” what could flomdren mean?
A. Steam
B. Ice
C. Rain
D. Smoke
*Answer: A — In this constructed language, combining “fire” and
“water” logically produces “steam.”
7. Which of these is an example of a brute-force attack?
A. Guessing a password repeatedly
B. Injecting SQL commands
C. Capturing packets in a network
D. Phishing emails
*Answer: A — Brute-force attacks systematically try all possible
passwords until one works.
, 8. What does the term “hashing” refer to in security?
A. Encrypting data so it can be reversed
B. Converting data into a fixed-length value
C. Hiding files in a folder
D. Creating a backup copy
*Answer: B — Hashing produces a fixed-length digest from data,
commonly used for password storage.
9. In the made-up language “Zyra,” if trel = “run” and nok = “fast,”
what is the meaning of trelnok?
A. Walk slowly
B. Run fast
C. Jump high
D. Stop quickly
*Answer: B — Combining “run” and “fast” gives “run fast” in the
fictional language.
10. What type of malware disguises itself as legitimate software?
A. Virus
B. Trojan horse
C. Worm
D. Ransomware
*Answer: B — A Trojan horse appears legitimate but performs malicious
activities.
11. Which of the following is a secure practice for password
management?
A. Writing passwords on paper
B. Using a password manager
C. Reusing the same password for all accounts
D. Using short, simple passwords