1) Which of the following is not part of the CIA Triad? a) Confidentiality b) Integrity c) Authenticity d) Availability 2) Which of the following authentication methods is considered two-factor? a) Username and password b) Password and smart card c) Fingerprint scan only d) PIN code only 3) Which cybersecurity concept encourages users to have only the amount of access necessary to perform their jobs? a) Multi-factor Authentication b) Defense in Depth c) Principle of Least Privilege d) Separation of Duties 4) Which principle of information security helps in ensuring data has not been altered or tampered with? a) Confidentiality b) Integrity c) Availability d) Non-repudiation 5) What is the primary purpose of a firewall? a) Encrypt data at rest b) Detect unauthorized access to a network c) Block unauthorized network access d) Provide a backup for data 6) What is a key benefit of auditing in information security? a) Ensures system availability b) Deters unauthorized actions c) Guarantees data confidentiality d) Prevents denial-of-service attacks 7) What is an example of something you "have" in multi-factor authentication? a) Password b) Security Token c) Fingerprint d) Knowledge-based answer 8) What is the main focus of Confidentiality in the CIA Triad? a) Ensuring data is accurate b) Ensuring data is accessible only to authorized users c) Protecting data from being deleted d) Verifying data authenticity 9) The process of granting permissions to users based on their identity is known as: a) Authentication b) Identification c) Authorization d) Encryption 10) The main purpose of encryption is to ensure which of the following? a) Confidentiality b) Integrity c) Availability d) Accountability 11) Which of the following best defines Least Privilege? a) A method for authenticating users securely b) Ensuring users have only the access necessary to perform their job c) A principle ensuring all data is backed up regularly d) A tool used to prevent data leaks 12) What is a key element of Non-repudiation in cybersecurity? a) Ensuring data is backed up b) Ensuring a party cannot deny their actions c) Ensuring data is encrypted during transmission d) Ensuring data is protected from modification

Cybersecurity Fundamentals

Leaderboard

Visual style

Options

Switch template

Continue editing: ?