#1
Which of the following is NOT a fundamental principle of information security?
#2
What is the primary purpose of access control in a computing system?
#3
Which access control model assigns permissions based on the concept of roles?
#4
What does CIA stand for in the context of information security?
#5
What is the principle of least privilege in the context of access control?
#6
What is the difference between authentication and authorization?
#7
Which of the following is an example of two-factor authentication?
#8
What is a common method to prevent unauthorized access to a wireless network?
#9
Which cryptographic technique is used to verify the integrity of data?
#10
What is the purpose of data masking?
#11
What is the purpose of a honeypot in cybersecurity?
#12
What is the principle of secure coding practices?
#13