1) Which of the following is not part of the CIA Triad? a) Confidentiality b) Integrity c) Authenticity d) Availability 2) The Parkerian Hexad extends the CIA Triad by including which of the following? a) Authenticity, Possession, Utility b) Encryption, Hashing, Non-repudiation c) Accountability, Non-repudiation, Utility d) Reliability, Authenticity, Encryption 3) Which type of attack involves unauthorized capture of data? a) Interception b) Modification c) Fabrication d) Interruption 4) In the Risk Management process, which step involves implementing controls to reduce risk? a) Identification b) Mitigation c) Evaluation d) Assessment 5) What is the purpose of the "Eradication" stage in the Incident Response process? a) Detecting an incident b) Restoring operations c) Completely removing the root cause of the incident d) Preventing further damage 6) "Defense in Depth" is primarily focused on: a) A single strong firewall b) Using multiple layers of security c) Reducing the cost of security infrastructure d) Relying only on perimeter security 7) Which of the following is an example of a logical control? a) Firewalls b) Security policy c) User training d) Fences 8) Which of the following authentication methods is considered two-factor? a) Username and password b) Password and smart card c) Fingerprint scan only d) PIN code only 9) In the context of access control models, which is enforced by the operating system? a) Discretionary Access Control (DAC) b) Role-Based Access Control (RBAC) c) Mandatory Access Control (MAC) d) Capability-Based Control 10) Which attack specifically targets the availability aspect of the CIA Triad? a) Interception b) Modification c) Denial of Service (DoS) d) Phishing 11) Which cybersecurity concept encourages users to have only the amount of access necessary to perform their jobs? a) Multi-factor Authentication b) Defense in Depth c) Principle of Least Privilege d) Separation of Duties 12) What type of encryption is used when both the sender and receiver use the same key? a) Asymmetric encryption b) Symmetric encryption c) Hashing d) Public-key infrastructure 13) The GDPR applies primarily to: a) Residents of California b) Residents of the European Union c) Healthcare providers in the US d) Financial institutions in the US 14) Which principle of information security helps in ensuring data has not been altered or tampered with? a) Confidentiality b) Integrity c) Availability d) Non-repudiation 15) What is the primary purpose of a firewall? a) Encrypt data at rest b) Detect unauthorized access to a network c) Block unauthorized network access d) Provide a backup for data 16) A role-based access control model (RBAC) assigns permissions based on: a) Individual user discretion b) The user's job c) Specific rules enforced by the system d) The user's identity only 17) What is a key benefit of auditing in information security? a) Ensures system availability b) Deters unauthorized actions c) Guarantees data confidentiality d) Prevents denial-of-service attacks 18) What is an example of something you "have" in multi-factor authentication? a) Password b) Security Token c) Fingerprint d) Knowledge-based answer 19) Which of the following is NOT a part of the Parkerian Hexad? a) Utility b) Possession c) Accountability d) Confidentiality 20) The process of tracking malicious activities and ensuring logs are admissible in court refers to: a) Authentication b) Non-repudiation c) Accountability d) Confidentiality 21) Which of the following cybersecurity tools focuses on identifying network vulnerabilities? a) Network scanners b) Antivirus software c) Encryption software d) Firewalls 22) Which attack method tricks a program into misusing its authority? a) Cross-Site Scripting (XSS) b) SQL Injection c) Confused Deputy Problem d) Phishing 23) Which of the following best defines cryptography? a) A method to detect unauthorized system access b) The practice of securing data through encryption c) A type of cyber attack d) A tool to analyze logs 24) A Digital Signature primarily ensures: a) Availability b) Confidentiality c) Integrity and authenticity d) Data modification 25) Which law focuses on the protection of healthcare information in the United States? a) HIPAA b) FERPA c) SOX d) GLBA 26) What is the main focus of Confidentiality in the CIA Triad? a) Ensuring data is accurate b) Ensuring data is accessible only to authorized users c) Protecting data from being deleted d) Verifying data authenticity 27) Which of the following attacks directly threatens data integrity? a) Denial of Service (DoS) b) Interception c) Modification d) Fabrication 28) Which of the following is a characteristic of Asymmetric Cryptography? a) Uses the same key for encryption and decryption b) Uses two different keys for encryption and decryption c) Requires a shared secret key d) Is faster than Symmetric Cryptography 29) The principle of "Defense in Depth" includes which of the following? a) Single-layered security b) Continuous monitoring only c) Multiple layers of defense d) Strong user authentication only 30) Which of the following describes the "Preparation" stage in the Incident Response process? a) Restoring systems to their original state b) Identifying the type of attack c) Implementing controls to prevent future attacks d) Setting up a team and policy for handling incidents 31) In Risk Management, what does the "Assessment" phase focus on? a) Monitoring the network for attacks b) Evaluating the level of risk posed by vulnerabilities c) Applying security patches d) Eradicating threats from the system 32) Which of the following is a type of physical control? a) Firewalls b) Antivirus software c) Surveillance Equipment d) Encryption algorithms 33) The Confused Deputy Problem is commonly exploited in: a) Cross-Site Request Forgery (CSRF) b) Phishing attacks c) Denial of Service (DoS) attacks d) Ransomware attacks 34) The process of granting permissions to users based on their identity is known as: a) Authentication b) Identification c) Authorization d) Encryption 35) Which of the following aligns with the "Utility" principle in the Parkerian Hexad? a) Ensuring data is accurate b) Ensuring data is available when needed c) Ensuring data serves its intended purpose d) Ensuring data is protected from unauthorized access 36) The main purpose of encryption is to ensure which of the following? a) Confidentiality b) Integrity c) Availability d) Accountability 37) Which of the following best describes a "Fabrication" attack? a) Creating false data or activities b) Preventing a system from functioning c) Capturing unauthorized data d) Tampering with data 38) The Incident Response process includes which of the following stages? a) Incident Eradication and Backup b) Containment and Eradication c) Availability and Non-repudiation d) Integrity and Containment 39) Which of the following targets data at rest? a) Data leakage b) Man-in-the-Middle attack c) SQL Injection d) Phishing attack 40) Which of the following describes a "short-term containment" action in incident response? a) Restoring normal operations after an incident b) Quickly stopping the spread of an attack c) Removing the root cause of the attack d) Evaluating the damage after the attack 41) What is a primary focus of Identity and Access Management (IAM)? a) Encrypting sensitive data b) Assigning and managing user privileges c) Blocking unauthorized IP addresses d) Auditing network traffic 42) Which of the following best defines Least Privilege? a) A method for authenticating users securely b) Ensuring users have only the access necessary to perform their job c) A principle ensuring all data is backed up regularly d) A tool used to prevent data leaks 43) In the context of information security, Integrity ensures: a) That data is confidential b) That data remains accurate and unaltered c) That systems are always available d) That data can be easily accessed 44) Which of the following types of controls would include employee security training? a) Physical controls b) Logical controls c) Administrative controls d) Endpoint controls 45) Which of the following is a principle in capability-based security? a) Relying solely on the user's identity for permissions b) Attaching permissions to the resource itself c) Preventing users from accessing the system without approval d) Applying permissions at the file system level only 46) Which type of cryptography uses different keys for encryption and decryption? a) Symmetric b) Asymmetric c) Hashing d) Elliptic curve 47) Which of the following compliance regulations is focused on the protection of financial data? a) HIPAA b) FERPA c) PCI DSS d) GLBA 48) What is a key element of Non-repudiation in cybersecurity? a) Ensuring data is backed up b) Ensuring a party cannot deny their actions c) Ensuring data is encrypted during transmission d) Ensuring data is protected from modification 49) Which of the following cybersecurity tools is designed to identify software vulnerabilities? a) Intrusion Detection Systems b) Web Application Scanners c) Firewalls d) Antivirus programs 50) Which stage in the Incident Response process involves analyzing how an incident occurred and improving the response plan? a) Preparation b) Identification c) Lessons Learned d) Recovery

Fundamentals of InfoSec Warm Up Quiz

Classifica

Stile di visualizzazione

Opzioni

Cambia modello

Ripristinare il titolo salvato automaticamente: ?