Information Security Exam Questions
with Correct Answers
Define the confidentiality in the CIA triad. - Correct Answer Our ability to protect data from those
who are not authorized to view it."
"Examples of confidentiality - Correct Answer A patron using an ATM card wants to keep their PIN
number confidential.
An ATM owner wants to keep bank account numbers confidential."
"Pretexting - Correct Answer a form of social engineering in which one individual lies to obtain
confidential data about another individual"
"Phishing - Correct Answer An attack that sends an email or displays a Web announcement that
falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering
private information"
"competitive intelligence - Correct Answer the process of intelligence gathering and analysis to
support business decisions"
"Competitive Counterintelligence - Correct Answer the practice of managing the range of
intelligence-gathering activities directed at an organization"
"Network-based IDS (NIDS) - Correct Answer an independent platform that monitors network traffic
to identify intruders."
"host-based IDS - Correct Answer are used to analyze the activities on or directed at the network
interface of a particular asset (host)."
"Wireshark - Correct Answer a sniffer that is capable of intercepting and troubleshooting traffic from
both wired and wireless sources."
"Nmap - Correct Answer A network utility designed to scan a network and create a map. Frequently
used as a vulnerability scanner."
, "Which port service needs to be removed when running a webserver? - Correct Answer 53"
"Port 80 - Correct Answer provides Hypertext Transfer Protocol (HTTP) services, which serves Web
content."
"AES - Correct Answer AES is the standard encryption algorithm used by the US Federal
government."
"SSRF - Correct Answer (Server-Side Request Forgery) An attack that takes advantage of a trusting
relationship between web servers. Attacker finds vulnerable web application, sends request to web
server, web server performs request on behalf of attacker."
"kismet - Correct Answer Kismet is a tool commonly used to detect wireless access points."
"Hping3 - Correct Answer A tool used to test the security of firewalls and map network topology.
- constructs specially crafted ICMP packets to evade measures to hide devices behind firewall
- scripting functionality to test firewall/IDS"
"Burp Suite - Correct Answer Burp Suite is a web assessment and analysis tool that looks for issues
on websites such as cross-site scripting or SQL injection flaws."
"Fuzzer - Correct Answer A type of tool that works by bombarding our applications with all manner of
data and inputs from a wide variety of sources, in the hope that we can cause the application to fail
or to perform in unexpected ways"
"How can confidentiality be broken? - Correct Answer Losing a laptop
An attacker gets access to info
A person can look over your shoulder"
"Define integrity in the CIA triad. - Correct Answer The ability to prevent people from changing your
data and the ability to reverse unwanted changes."
"How do you control integrity? - Correct Answer Permissions restrict what users can do (read, write,
etc.)"
"Examples of integrity - Correct Answer Data used by a doctor to make medical decisions needs to
be correct or the patient can die."