#1
Which of the following is an example of a physical security measure?
Firewall
Encryption
Biometric authentication
Locked doors
#2
What is the purpose of encryption in data security?
To prevent unauthorized access by encoding data
To monitor network traffic
To update software patches
To restrict physical access to servers
#3
What is the purpose of a firewall in data security?
To encrypt data traffic
To detect and remove malware
To regulate incoming and outgoing network traffic
To manage user authentication
#4
Which of the following is an example of a technical security measure?
Security awareness training
Physical access controls
Biometric authentication
Data encryption
#5
Which of the following is a feature of a secure password?
Contains only uppercase letters
Is the same as the username
Is at least 8 characters long and includes a mix of letters, numbers, and special characters
Is written down on a sticky note
#6
Which of the following is a form of biometric authentication?
Retina scanning
Password
PIN
Security question
#7
Which of the following is NOT a recommended practice for securing sensitive data?
Regularly updating software and security patches
Storing passwords in plain text
Implementing multi-factor authentication
Regularly backing up data
#8
What is the role of access controls in data security?
To prevent data loss
To regulate physical access to buildings
To manage and restrict user access to data
To detect cybersecurity threats
#9
What is the purpose of a VPN (Virtual Private Network) in data security?
To physically secure server rooms
To encrypt data traffic over public networks
To manage user access to sensitive data
To update antivirus software
#10
Which of the following is a common method used for authentication in data security?
HTTP
PKI (Public Key Infrastructure)
SMTP
DNS
#11
What is the purpose of role-based access control (RBAC) in data security?
To encrypt data during transmission
To authenticate users based on biometrics
To assign permissions to users based on their roles
To monitor network traffic
#12
What is the primary goal of penetration testing?
To evaluate the effectiveness of security controls by simulating attacks
To monitor network traffic for suspicious activities
To encrypt sensitive data
To perform regular backups of data
#13
What is the primary goal of data masking?
To encrypt data during transmission
To hide sensitive information by replacing it with fictional data
To authenticate users based on their biometrics
To prevent unauthorized access to databases
#14
What is the purpose of a Security Information and Event Management (SIEM) system?
To analyze network traffic
To detect and respond to security incidents
To encrypt data at rest
To manage user permissions
#15
Which encryption algorithm is commonly used to secure online transactions?
RSA (Rivest-Shamir-Adleman)
MD5 (Message Digest Algorithm 5)
DES (Data Encryption Standard)
ROT13 (Rotate by 13 places)
#16
What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses two keys, while asymmetric encryption uses one key.
Symmetric encryption is faster but less secure than asymmetric encryption.
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys.
Asymmetric encryption is only used for data at rest, while symmetric encryption is used for data in transit.
#17
What is the purpose of a honeypot in cybersecurity?
To detect and deflect unauthorized access attempts
To collect information about potential threats
To monitor network traffic
To encrypt sensitive data