Information Security Questions and
Answers | Latest Update | 2024/2025 |
Already Passed
What is the role of security awareness training in an organization?
A) To ensure all employees have administrative privileges
B) To inform employees about potential security threats and safe practices
C) To automate security measures
D) To reduce operational costs
✔✔ B) To inform employees about potential security threats and safe practices
What does the term "zero-day vulnerability" refer to?
A) A vulnerability that has been known for years
B) A flaw that is exploited before a patch is released
C) A type of physical security breach
D) A database management error
✔✔ B) A flaw that is exploited before a patch is released
1
,What is the purpose of incident response planning?
A) To ensure compliance with regulations
B) To establish procedures for responding to security incidents effectively
C) To improve network performance
D) To manage employee productivity
✔✔ B) To establish procedures for responding to security incidents effectively
What does the CIA triad stand for in information security?
A) Confidentiality, Integrity, Availability
B) Compliance, Integrity, Accessibility
C) Control, Identity, Availability
D) Confidentiality, Identity, Accountability
✔✔ A) Confidentiality, Integrity, Availability
What is the primary objective of information security?
A) To improve system performance
B) To protect the confidentiality, integrity, and availability of information
C) To enhance user experience
2
,D) To reduce operational costs
✔✔ B) To protect the confidentiality, integrity, and availability of information
Which of the following is a common threat to information security?
A) Phishing
B) Data encryption
C) Firewall configuration
D) Software updates
✔✔ A) Phishing
What does the principle of least privilege entail?
A) Users should have unrestricted access to all data
B) Users should be given only the access necessary to perform their job functions
C) All employees should have administrative privileges
D) Access should be based on user trust levels
✔✔ B) Users should be given only the access necessary to perform their job functions
What is a firewall primarily used for?
3
, A) To back up data
B) To monitor employee performance
C) To filter incoming and outgoing network traffic
D) To enhance hardware performance
✔✔ C) To filter incoming and outgoing network traffic
Which encryption method uses the same key for both encryption and decryption?
A) Asymmetric encryption
B) Symmetric encryption
C) Hashing
D) Digital signatures
✔✔ B) Symmetric encryption
What is social engineering in the context of information security?
A) A technique used to bypass firewalls
B) A method of manipulating people into divulging confidential information
C) A type of software vulnerability
D) A network configuration error
4