Midterms
Finals
100

What is the primary purpose of a firewall?

Block unauthorized access to or from a network

100

What is the purpose of a security policy in an organization?

To enforce standard practices and define acceptable behavior

200

Which of the following is an example of social engineering?

Phishing email asking for login credentials

200

This type of encryption uses the same key for both encryption and decryption.

Symmetric Encryption

300

What does the term “least privilege” mean in access control?

Users should have only the minimum access necessary

300

A mathematical function that converts input data into a fixed-size string, often used for integrity checking.

Hash Function

400

What kind of attack intercepts and possibly alters communication between two parties?

Man-in-the-Middle (MITM)

400

A public-key algorithm that relies on the difficulty of factoring large prime numbers.

RSA (Rivest-Shamir-Adleman)

500

What does 2FA (Two-Factor Authentication) provide?  

It adds a second layer of verification to user login

500

The process of converting readable data into an unreadable format to prevent unauthorized access.

Encryption

M
e
n
u