C843 ITAS 3030
Managing Information Security
LATEST FA REVIEW
Q&S
©2024/2025
,1. Which of the following is a primary goal of a Security
Information and Event Management (SIEM) system?
a) Hardware optimization
b) Centralized logging
c) Network latency reduction
d) Application development
ANS: b) Centralized logging
2. In the context of information security, what does the term "least
privilege" refer to?
a) Reducing security budgets
b) Limiting access rights for users to the bare minimum required
c) Granting all privileges to system administrators
d) Decreasing the number of system updates
ANS: b) Limiting access rights for users to the bare
minimum required
3. Which of the following encryption algorithms is considered
resistant to quantum computing attacks?
a) RSA
©2024/2025
, b) AES
c) SHA-256
d) Lattice-based cryptography
ANS: d) Lattice-based cryptography
4. What is the primary purpose of a honeypot in cybersecurity?
a) To encrypt sensitive data
b) To serve as a decoy system for malicious attackers
c) To improve network speeds
d) To automatically repair vulnerabilities
ANS: b) To serve as a decoy system for malicious attackers
5. Which of the following is NOT a phase in the NIST
Cybersecurity Framework?
a) Identify
b) Protect
c) Attack
d) Respond
ANS: c) Attack
©2024/2025
Managing Information Security
LATEST FA REVIEW
Q&S
©2024/2025
,1. Which of the following is a primary goal of a Security
Information and Event Management (SIEM) system?
a) Hardware optimization
b) Centralized logging
c) Network latency reduction
d) Application development
ANS: b) Centralized logging
2. In the context of information security, what does the term "least
privilege" refer to?
a) Reducing security budgets
b) Limiting access rights for users to the bare minimum required
c) Granting all privileges to system administrators
d) Decreasing the number of system updates
ANS: b) Limiting access rights for users to the bare
minimum required
3. Which of the following encryption algorithms is considered
resistant to quantum computing attacks?
a) RSA
©2024/2025
, b) AES
c) SHA-256
d) Lattice-based cryptography
ANS: d) Lattice-based cryptography
4. What is the primary purpose of a honeypot in cybersecurity?
a) To encrypt sensitive data
b) To serve as a decoy system for malicious attackers
c) To improve network speeds
d) To automatically repair vulnerabilities
ANS: b) To serve as a decoy system for malicious attackers
5. Which of the following is NOT a phase in the NIST
Cybersecurity Framework?
a) Identify
b) Protect
c) Attack
d) Respond
ANS: c) Attack
©2024/2025