#1
What is the primary goal of access control in sensitive programs?
To restrict unauthorized access
ExplanationLimiting entry to authorized users.
#2
Which of the following is an example of a strong password?
aB$%7p2Q
ExplanationA combination of uppercase, lowercase, numbers, and special characters.
#3
What is the purpose of encryption in the context of program security?
To convert data into a secure format
ExplanationTransforming data into an unreadable form to protect it from unauthorized access.
#4
What is the purpose of role-based access control (RBAC) in security?
To assign access permissions based on user roles
ExplanationGranting access based on predefined roles or responsibilities.
#5
In the context of program security, what is social engineering?
Manipulating individuals to divulge confidential information
ExplanationDeceiving people into revealing sensitive data.
#6
What is the difference between authentication and authorization in security?
Authentication verifies identity, while authorization grants access based on permissions
ExplanationConfirming identity versus permitting access.
#7
What is a security token in the context of access control?
A digital or physical device used to prove identity electronically
ExplanationA tool for electronically confirming identity.
#8
What is the concept of a 'honeypot' in cybersecurity?
A security mechanism designed to detect, deflect, or counteract unauthorized access
ExplanationA trap to lure and neutralize attackers or detect intrusions.
#9
How does a VPN (Virtual Private Network) contribute to program security?
By creating a secure, encrypted connection over the internet
ExplanationEstablishing a private, encrypted network connection over the internet.
#10
What is the purpose of a security audit in a sensitive program?
To evaluate and ensure the effectiveness of security measures
ExplanationAssessing and confirming the efficiency of security protocols.
#11
What is the primary purpose of a security policy in program security?
To establish guidelines and rules for protecting sensitive information and resources
ExplanationDefining protocols for safeguarding valuable data and assets.
#12
What is the purpose of a security token in two-factor authentication (2FA)?
A digital or physical device used to generate or receive authentication codes
ExplanationA tool for producing or receiving authentication codes.
#13
What does the term 'phishing' refer to in the context of cybersecurity?
A type of social engineering attack that involves tricking individuals into revealing sensitive information
ExplanationDeceiving individuals to divulge confidential data.
#14
What does the term 'firewall' refer to in computer security?
A device that prevents unauthorized access
ExplanationA barrier that filters network traffic to block unauthorized access.
#15
What is the principle behind two-factor authentication (2FA)?
Verifying identity with two separate factors
ExplanationUsing two distinct methods to confirm a user's identity.
#16
What is the significance of the principle of least privilege in access control?
Granting the minimum necessary permissions for a user to perform their job functions
ExplanationProviding only the permissions essential for fulfilling tasks.
#17
What is the purpose of intrusion detection systems (IDS) in security?
To detect and respond to unauthorized access or activities
ExplanationIdentifying and reacting to suspicious behavior or network intrusions.
#18
What is the purpose of biometric authentication in program security?
To verify identity using physical or behavioral characteristics
ExplanationConfirming identity through unique physical traits or behaviors.
#19
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key for both encryption and decryption, while asymmetric uses different keys
ExplanationSame key for both encryption and decryption versus distinct keys.
#20
What is the concept of zero trust security in the context of access control?
Verifying and validating the identity of every user, device, or application before granting access
ExplanationDoubting the legitimacy of all requests and requiring verification for each.
#21
What is the role of a Public Key Infrastructure (PKI) in security?
To manage and secure digital keys and certificates
ExplanationOverseeing and safeguarding digital keys and certificates.
#22
In the context of security, what does the term 'penetration testing' refer to?
Simulating cyberattacks to identify and address vulnerabilities
ExplanationImitating attacks to discover and fix weaknesses.
#23
What is the significance of multi-factor authentication (MFA) in program security?
Verifying identity with two or more authentication factors
ExplanationConfirming identity through multiple verification methods.
#24
What is the role of a security incident response plan in program security?
To provide a structured approach for responding to and managing security incidents
ExplanationOffering a systematic method for handling security breaches.
#25
What is the primary purpose of a security sandbox in program security?
To provide a controlled environment for executing untrusted code or applications
ExplanationCreating a safe space for testing and executing potentially harmful software.