Multiple Choice: Which of the following is considered a foundational principle of cybersecurity
architecture?
a) Confidentiality
b) Redundancy
c) Scalability
d) All of the above
Answer: d) All of the above
Rationale: Confidentiality ensures that sensitive information is accessed only by authorized
individuals. Redundancy provides backup systems to maintain availability in case of failure.
Scalability ensures the system can grow and manage increased demand. Together, these
principles support a robust cybersecurity architecture.
True/False: In cybersecurity, 'Defense in Depth' refers to the practice of layering multiple
security measures to protect data.
1
, Page 2 of 34
Answer: True
Rationale: 'Defense in Depth' is a strategy that employs a series of defensive mechanisms to
protect data and prevent the advance of an attack.
Fill-in-the-Blank: The _____ model is a conceptual framework that outlines the processes for
maintaining the integrity, confidentiality, and availability of information.
Answer: CIA Triad
Rationale: The CIA Triad stands for Confidentiality, Integrity, and Availability, which are the core
principles of information security.
Multiple Choice: Which layer of the OSI model is responsible for ensuring error-free data
transmission between two devices?
a) Application
b) Presentation
c) Data Link
2
, Page 3 of 34
d) Physical
Answer: c) Data Link
Rationale: The Data Link layer is responsible for error detection and correction to ensure reliable
data transmission between two devices.
Multiple Choice: What is the main purpose of a firewall in a network?
a) To encrypt data
b) To block unauthorized access
c) To store data
d) To perform backups
Answer: b) To block unauthorized access
Rationale: A firewall is a network security device that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
True/False: A Virtual Private Network (VPN) provides a secure connection over a public network.
3
, Page 4 of 34
Answer: True
Rationale: A VPN creates a secure, encrypted connection over a less secure network, such as the
internet, providing privacy and security.
Multiple Choice: Which type of malware is designed to replicate itself and spread to other
devices?
a) Trojan Horse
b) Spyware
c) Virus
d) Adware
Answer: c) Virus
Rationale: A virus is a type of malicious software that can replicate itself and spread to other
devices, often causing harm to systems and data.
Multiple Choice: Which encryption method uses two keys, one public and one private?
4