#1
What is a phishing attack?
Sending deceptive emails to trick individuals into revealing sensitive information
ExplanationDeceiving individuals through emails to steal sensitive data.
#2
Which of the following is NOT considered a strong password?
123456
ExplanationA weak password often used due to its simplicity.
#3
What is the main purpose of security awareness training?
To educate employees about security risks and best practices
ExplanationInforming personnel about security protocols and risks.
#4
Which of the following is an example of a physical security control?
Biometric access reader
ExplanationUsing biometric devices for access control.
#5
What is the purpose of a data backup?
To create a copy of data for recovery in case of loss
ExplanationCreating duplicates of data for recovery purposes.
#6
What does HTTPS stand for in the context of web browsing?
Hypertext Transfer Protocol Secure
ExplanationA secure protocol for browsing, ensuring data encryption.
#7
What is the purpose of two-factor authentication (2FA)?
To provide an extra layer of security beyond passwords
ExplanationEnhancing security with an additional verification method.
#8
What is the purpose of a firewall in network security?
To monitor and control network traffic based on predetermined security rules
ExplanationRegulating network traffic to prevent unauthorized access.
#9
Which of the following is an example of physical security measure?
Biometric access control systems
ExplanationUsing biological traits for access control.
#10
What is the primary goal of data classification?
To classify data based on its sensitivity and importance
ExplanationOrganizing data based on its value and sensitivity.
#11
What does the term 'social engineering' refer to in the context of security?
A method of manipulating people into divulging confidential information
ExplanationExploiting human psychology to gain unauthorized access.
#12
What is the concept of least privilege in the context of security?
Limiting users' access rights to only what is necessary for their job
ExplanationGranting minimal access necessary for functionality.
#13
Which of the following is an example of a strong authentication factor?
Something you know
ExplanationAuthentication based on knowledge, such as a password.