#1
What does the acronym 'OPSEC' stand for?
Operational Security
ExplanationProtecting sensitive information by controlling what information is shared and with whom.
#2
Which of the following is NOT a principle of OPSEC?
Openness
ExplanationDisclosing information freely without considering its sensitivity or impact on security.
#3
What is the purpose of a firewall in network security?
To prevent unauthorized access to or from a private network
ExplanationMonitoring and controlling incoming and outgoing network traffic based on predetermined security rules.
#4
Which of the following is a common social engineering technique?
Phishing
ExplanationDeceiving individuals to divulge sensitive information through fraudulent emails or websites.
#5
What is the purpose of a VPN (Virtual Private Network) in network security?
To provide secure remote access to a private network over the internet
ExplanationEstablishing encrypted connections over the internet to access private networks securely from remote locations.
#6
In the context of security, what does the term 'compartmentalization' refer to?
Isolating different types of data or functions from each other
ExplanationSegregating sensitive information or functions to limit access and reduce risk.
#7
What is the primary goal of threat modeling in security?
To identify and prioritize potential threats to a system
ExplanationAssessing potential vulnerabilities and risks to implement effective security measures.
#8
What is the purpose of penetration testing in security?
To identify and assess security weaknesses
ExplanationSimulating cyber-attacks to evaluate the effectiveness of security measures and identify vulnerabilities.
#9
What is the primary goal of cryptography in information security?
To protect data confidentiality, integrity, and authenticity
ExplanationSecuring data by encoding it in a way that only authorized parties can access and understand.
#10
What is the purpose of security patches?
To remove existing vulnerabilities
ExplanationUpdating software to fix security flaws and protect systems from potential cyber-attacks.
#11
Which of the following is NOT a common method of information disclosure?
Least privilege
ExplanationGranting minimal access rights necessary for tasks, reducing the risk of data exposure.
#12
What is the concept of 'least privilege' in security?
Granting access only to those resources necessary for the performance of a task
ExplanationMinimizing access rights to the bare minimum required for performing tasks, reducing potential damage from breaches.
#13
What is the purpose of access control lists (ACLs) in network security?
To filter network traffic based on predefined rules
ExplanationRegulating network access by specifying which users or systems are allowed or denied access to resources.
#14
What is the primary purpose of a WAF (Web Application Firewall) in cybersecurity?
To protect web applications from common security threats
ExplanationMonitoring, filtering, and blocking HTTP traffic between a web application and the internet to prevent attacks.
#15
Which of the following is NOT a common type of malware?
Firewall
ExplanationSoftware designed to block unauthorized access to or from a private network, not typically considered malware.