#1
1. What does PII stand for in the context of sensitive information?
Personal Information Inventory
Private Information Identifier
Public Information Index
Personally Identifiable Information
#2
8. What is the role of a 'Chief Information Security Officer (CISO)' in an organization?
Managing the company's finances
Ensuring the security of information and data
Handling human resources
Overseeing marketing strategies
#3
14. In information security, what does the acronym 'VPN' stand for?
Virtual Private Network
Very Private Network
Virtual Personal Network
Visible Public Network
#4
15. What is the importance of 'Security Awareness Training' in organizations?
To increase productivity
To educate employees about potential security risks and best practices
To install antivirus software
To organize team-building activities
#5
19. What is the purpose of a 'Biometric Access Control System'?
To manage email accounts
To control physical access based on unique biological traits
To encrypt data on storage devices
To monitor network traffic
#6
2. Which of the following is a common method for secure data transmission over the internet?
#7
3. What is the principle of least privilege in information security?
Granting the maximum access rights to all users
Granting access rights based on necessity
Not granting any access rights
Revoking access rights randomly
#8
6. What is the purpose of a 'Data Loss Prevention (DLP)' system?
To intentionally leak sensitive information
To prevent accidental or intentional unauthorized access and sharing of sensitive data
To increase data storage capacity
To recover lost data
#9
9. Which of the following is a common method for secure password storage?
Storing passwords in plaintext
Using strong encryption algorithms
Sharing passwords openly
Writing passwords on sticky notes
#10
12. What is the concept of 'Data Masking'?
A technique to make data invisible to the naked eye
A method to hide sensitive information by replacing or encrypting original data
A form of data compression
A process to generate fake data
#11
4. What is the purpose of encryption in handling sensitive information?
To hide information from authorized users
To ensure data integrity during transmission
To protect information from unauthorized access
To increase data processing speed
#12
5. In the context of information security, what is a 'firewall'?
A physical barrier to prevent access
A software or hardware device to filter network traffic
A protective shield for computers
A tool to recover lost data
#13
7. What does the term 'Social Engineering' refer to in the context of information security?
A type of computer virus
A method to manipulate individuals into divulging confidential information
A secure authentication process
A hardware security module
#14
10. What is the significance of 'Two-Factor Authentication (2FA)' in information security?
It adds an extra layer of security by requiring two forms of identification
It simplifies the authentication process
It increases the risk of unauthorized access
It is only applicable to physical access control
#15
11. What is the primary goal of a 'Red Team' in cybersecurity?
To design secure systems
To simulate attacks and identify vulnerabilities
To implement data encryption
To manage network infrastructure