#1
Which of the following is NOT a common security procedure in a workplace?
Sharing passwords with colleagues
ExplanationNot sharing passwords enhances security.
#2
What is the primary purpose of a firewall in a network security system?
To regulate and control incoming and outgoing network traffic
ExplanationFirewalls monitor and filter network traffic for security.
#3
Which of the following is NOT a common password security practice?
Sharing passwords with colleagues
ExplanationSharing passwords compromises security.
#4
Which of the following is a common method to protect sensitive data during transmission over a network?
Data encryption
ExplanationEncryption secures data from unauthorized access during transmission.
#5
Which of the following is a best practice for securing mobile devices?
Using device encryption
ExplanationEncryption safeguards data stored on mobile devices.
#6
What does 'BYOD' stand for in the context of security procedures?
Bring Your Own Device
ExplanationBYOD allows employees to use personal devices securely.
#7
In the context of cybersecurity, what does 'phishing' refer to?
A type of cyberattack involving malicious emails or websites
ExplanationPhishing aims to deceive users into revealing sensitive information.
#8
Which of the following is NOT a common factor considered in risk assessment for security?
Level of network speed
ExplanationNetwork speed doesn't directly affect security risks.
#9
What does 'SSL' stand for in the context of internet security?
Secure Socket Layer
ExplanationSSL encrypts data transmitted over the internet.
#10
What is the purpose of biometric authentication?
To authenticate users based on physical or behavioral characteristics
ExplanationBiometric authentication enhances security by using unique traits.
#11
Which of the following is an example of social engineering?
Phishing attacks
ExplanationSocial engineering manipulates human behavior for malicious purposes.
#12
Which of the following laws regulates the protection of personal data in the European Union?
GDPR (General Data Protection Regulation)
ExplanationGDPR ensures the privacy and protection of personal data.
#13
What is the purpose of a security incident response plan?
To respond effectively to security incidents and minimize their impact
ExplanationIt outlines steps to manage and mitigate security breaches.
#14
In the context of data security, what is meant by 'data masking'?
Replacing sensitive data with fictitious but realistic data
ExplanationData masking protects sensitive information during processing.
#15
Which of the following is an example of a physical security measure?
Surveillance cameras
ExplanationSurveillance cameras deter physical security threats.
#16
What does 'DRM' stand for in the context of digital content protection?
Digital Rights Management
ExplanationDRM controls access to digital content.
#17
Which of the following laws requires organizations to provide notification of data breaches involving personal information?
HITECH Act (Health Information Technology for Economic and Clinical Health Act)
ExplanationHITECH mandates disclosure of data breaches to affected individuals.