#1
What is the primary goal of access control in sensitive programs?
To restrict unauthorized access
ExplanationLimiting entry to authorized users.
#2
Which of the following is an example of a strong password?
aB$%7p2Q
ExplanationA combination of uppercase, lowercase, numbers, and special characters.
#3
What is the purpose of encryption in the context of program security?
To convert data into a secure format
ExplanationTransforming data into an unreadable form to protect it from unauthorized access.
#4
What is the purpose of role-based access control (RBAC) in security?
To assign access permissions based on user roles
ExplanationGranting access based on predefined roles or responsibilities.
#5
In the context of program security, what is social engineering?
Manipulating individuals to divulge confidential information
ExplanationDeceiving people into revealing sensitive data.
#6
What is the difference between authentication and authorization in security?
Authentication verifies identity, while authorization grants access based on permissions
ExplanationConfirming identity versus permitting access.
#7
What is a security token in the context of access control?
A digital or physical device used to prove identity electronically
ExplanationA tool for electronically confirming identity.
#8
What does the term 'firewall' refer to in computer security?
A device that prevents unauthorized access
ExplanationA barrier that filters network traffic to block unauthorized access.
#9
What is the principle behind two-factor authentication (2FA)?
Verifying identity with two separate factors
ExplanationUsing two distinct methods to confirm a user's identity.
#10
What is the significance of the principle of least privilege in access control?
Granting the minimum necessary permissions for a user to perform their job functions
ExplanationProviding only the permissions essential for fulfilling tasks.
#11
What is the purpose of intrusion detection systems (IDS) in security?
To detect and respond to unauthorized access or activities
ExplanationIdentifying and reacting to suspicious behavior or network intrusions.
#12
What is the purpose of biometric authentication in program security?
To verify identity using physical or behavioral characteristics
ExplanationConfirming identity through unique physical traits or behaviors.
#13
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key for both encryption and decryption, while asymmetric uses different keys
ExplanationSame key for both encryption and decryption versus distinct keys.