#1
1. What does PII stand for in the context of sensitive information?
Personal Information Inventory
Private Information Identifier
Public Information Index
Personally Identifiable Information
#2
8. What is the role of a 'Chief Information Security Officer (CISO)' in an organization?
Managing the company's finances
Ensuring the security of information and data
Handling human resources
Overseeing marketing strategies
#3
14. In information security, what does the acronym 'VPN' stand for?
Virtual Private Network
Very Private Network
Virtual Personal Network
Visible Public Network
#4
15. What is the importance of 'Security Awareness Training' in organizations?
To increase productivity
To educate employees about potential security risks and best practices
To install antivirus software
To organize team-building activities
#5
19. What is the purpose of a 'Biometric Access Control System'?
To manage email accounts
To control physical access based on unique biological traits
To encrypt data on storage devices
To monitor network traffic
#6
2. Which of the following is a common method for secure data transmission over the internet?
#7
3. What is the principle of least privilege in information security?
Granting the maximum access rights to all users
Granting access rights based on necessity
Not granting any access rights
Revoking access rights randomly
#8
6. What is the purpose of a 'Data Loss Prevention (DLP)' system?
To intentionally leak sensitive information
To prevent accidental or intentional unauthorized access and sharing of sensitive data
To increase data storage capacity
To recover lost data
#9
9. Which of the following is a common method for secure password storage?
Storing passwords in plaintext
Using strong encryption algorithms
Sharing passwords openly
Writing passwords on sticky notes
#10
12. What is the concept of 'Data Masking'?
A technique to make data invisible to the naked eye
A method to hide sensitive information by replacing or encrypting original data
A form of data compression
A process to generate fake data
#11
13. What does the term 'Phishing' refer to in the context of cybersecurity?
A fishing technique
A social engineering attack aimed at tricking individuals into revealing sensitive information
A firewall configuration
A type of encryption algorithm
#12
17. What is the purpose of a 'Honeypot' in cybersecurity?
A trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems
A security protocol for data transmission
A method to speed up internet connection
A type of encryption algorithm
#13
18. What is the difference between 'Authentication' and 'Authorization' in information security?
They are synonyms and can be used interchangeably
Authentication verifies identity, while authorization determines access permissions
Authorization involves biometric identification, while authentication uses passwords
They both refer to the same process of securing data
#14
21. What is the role of 'Incident Response' in cybersecurity?
To prevent incidents from occurring
To identify vulnerabilities in a system
To efficiently handle and mitigate the impact of security incidents
To manage social media accounts during an incident
#15
24. How does 'Role-Based Access Control (RBAC)' enhance security?
By allowing unrestricted access to all users
By granting access based on job roles and responsibilities
By encrypting data at rest
By removing access controls entirely
#16
25. In the context of cybersecurity, what does 'Penetration Testing' involve?
Testing the strength of physical security barriers
Simulating cyberattacks to identify vulnerabilities
Testing the usability of software applications
Testing the speed of internet connections
#17
4. What is the purpose of encryption in handling sensitive information?
To hide information from authorized users
To ensure data integrity during transmission
To protect information from unauthorized access
To increase data processing speed
#18
5. In the context of information security, what is a 'firewall'?
A physical barrier to prevent access
A software or hardware device to filter network traffic
A protective shield for computers
A tool to recover lost data
#19
7. What does the term 'Social Engineering' refer to in the context of information security?
A type of computer virus
A method to manipulate individuals into divulging confidential information
A secure authentication process
A hardware security module
#20
10. What is the significance of 'Two-Factor Authentication (2FA)' in information security?
It adds an extra layer of security by requiring two forms of identification
It simplifies the authentication process
It increases the risk of unauthorized access
It is only applicable to physical access control
#21
11. What is the primary goal of a 'Red Team' in cybersecurity?
To design secure systems
To simulate attacks and identify vulnerabilities
To implement data encryption
To manage network infrastructure
#22
16. What does the term 'Data Encryption Standard (DES)' refer to in cryptography?
A widely used algorithm for securing wireless networks
A symmetric-key block cipher used for data encryption
A public key infrastructure protocol
A method for compressing data
#23
20. What is the significance of 'Patch Management' in cybersecurity?
A method to fix tears in physical security barriers
To keep software and systems updated with the latest security patches
A process to apply makeup on vulnerabilities
A type of intrusion detection system
#24
22. What is the purpose of a 'Security Information and Event Management (SIEM) system'?
To design secure networks
To monitor, analyze, and manage security events in an organization
To encrypt sensitive information
To create secure passwords
#25
23. What does the term 'Zero-Day Exploit' refer to in cybersecurity?
An exploit that occurs at midnight
A vulnerability that is exploited before the software vendor releases a fix
A security protocol for data transmission
An exploit with zero impact on systems