#1
Which of the following is NOT a fundamental principle of information security?
Flexibility
ExplanationFlexibility is not a fundamental principle of information security; instead, it's about ensuring security measures are robust and consistent.
#2
What is the primary purpose of access control in a computing system?
To restrict access to authorized users
ExplanationAccess control aims to limit system entry to only authorized users, safeguarding against unauthorized access.
#3
Which access control model assigns permissions based on the concept of roles?
RBAC (Role-Based Access Control)
ExplanationRBAC assigns permissions based on predefined roles, streamlining access management.
#4
What does CIA stand for in the context of information security?
Confidentiality, Integrity, Availability
ExplanationCIA represents the core pillars of information security: Confidentiality, Integrity, and Availability.
#5
What is the principle of least privilege in the context of access control?
Users should have only the minimum permissions necessary to perform their tasks
ExplanationLeast privilege dictates that users should have only the minimum access rights required to fulfill their job responsibilities, limiting potential damage from misuse or accidents.
#6
What is the difference between authentication and authorization?
Authentication verifies the identity of a user, while authorization determines what the user can access
ExplanationAuthentication confirms user identity, while authorization controls access based on that identity, dictating what actions or resources a user can utilize.
#7
Which of the following is an example of two-factor authentication?
Fingerprint scan
ExplanationA fingerprint scan, alongside a password, exemplifies two-factor authentication, bolstering security through multiple verification methods.
#8
What is a common method to prevent unauthorized access to a wireless network?
Enable MAC filtering
ExplanationMAC filtering restricts network access to devices with specific MAC addresses, mitigating unauthorized entry.
#9
Which cryptographic technique is used to verify the integrity of data?
Hashing
ExplanationHashing ensures data integrity by generating unique fixed-size hash values for input data.
#10
What is the purpose of data masking?
To make data unreadable to unauthorized users
ExplanationData masking obscures sensitive data, rendering it incomprehensible to unauthorized individuals, safeguarding confidentiality.
#11
What is the purpose of a honeypot in cybersecurity?
To attract attackers and gather information about their tactics
ExplanationHoneypots decoy malicious actors, enticing them to interact, enabling security professionals to study their techniques and enhance defenses.
#12
What is the principle of secure coding practices?
To ensure that software is free of vulnerabilities
ExplanationSecure coding practices aim to develop software resistant to exploitation, minimizing vulnerabilities and enhancing overall system security.
#13
What is the purpose of encryption key management?
To ensure that encryption keys are stored securely
ExplanationEncryption key management involves securely generating, storing, and distributing encryption keys, vital for maintaining the confidentiality and integrity of encrypted data.