#1
Which of the following is a basic principle of information classification?
Confidentiality
ExplanationConfidentiality is the principle that ensures sensitive information is only accessible to authorized individuals.
#2
What is the primary purpose of access control in security procedures?
To prevent unauthorized access
ExplanationAccess control aims to restrict entry to authorized users and prevent unauthorized access to sensitive systems or data.
#3
Which of the following is a common authentication factor?
Something you know
ExplanationAuthentication factors include 'something you know,' such as passwords or PINs, to verify a user's identity.
#4
What does 'ACL' stand for in the context of security?
Access Control List
ExplanationAn Access Control List (ACL) is a list of permissions attached to an object that specifies which users or system processes are granted access to objects.
#5
Which of the following is NOT a type of malware?
Firewall
ExplanationA firewall is a security measure, not a type of malware. Malware includes malicious software like viruses, worms, and trojans.
#6
In the context of security procedures, what does the term 'phishing' refer to?
An attempt to obtain sensitive information by deception
ExplanationPhishing is a deceptive technique used to trick individuals into revealing confidential information, often through fake emails or websites.
#7
What is the purpose of a 'firewall' in network security?
To prevent unauthorized access to or from a private network
ExplanationA firewall acts as a barrier to unauthorized access, protecting a network by controlling incoming and outgoing traffic.
#8
What does the term 'biometrics' refer to in security systems?
Verifying identity through physical or behavioral characteristics
ExplanationBiometrics involves using unique physical or behavioral traits, such as fingerprints or facial recognition, for identity verification in security systems.
#9
What is the purpose of a 'VPN' (Virtual Private Network) in security?
To create a secure connection over a public network
ExplanationA VPN ensures a secure and encrypted connection over a public network, protecting data from unauthorized access.
#10
What is the purpose of 'Data Loss Prevention' (DLP) software?
To prevent sensitive data from being leaked or lost
#11
Which of the following is a characteristic of asymmetric encryption?
Requires a public and private key pair
ExplanationAsymmetric encryption involves the use of a pair of keys – public and private – for secure communication, ensuring confidentiality and authenticity.
#12
What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses different keys.
ExplanationSymmetric encryption uses the same key for both encryption and decryption, whereas asymmetric encryption employs a pair of public and private keys for secure communication.