What is the primary goal of confidentiality in information security?
a) Ensuring data is accurate and complete
b) Ensuring data is accessible when needed
c) Ensuring data is only accessible to authorized users
d) Ensuring users cannot deny their actions
c) Ensuring data is only accessible to authorized users
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
a. TFTP (Trivial File Transfer Protocol)
b. SSH (Secure Shell)
c. Telnet
d. RDP (Remote Desktop Protocol)
b. SSH (Secure Shell)
Which protocol allows for retrieving contents of an Internet page from a web server?
a. SNMP (Simple Network Management Protocol)
b. HTTP (Hypertext Transfer Protocol)
c. SMTP (Simple Mail Transfer Protocol)
d. IMAP (Internet Message Access Protocol)
b. HTTP (Hypertext Transfer Protocol)
Which attack involves writing more data to a buffer than it can hold?
a) SQL Injection
b) Buffer Overflow
c) Cross-Site Scripting (XSS)
d) Man-in-the-Middle (MITM)
b) Buffer Overflow
What does the integrity principle in security ensure?
a) Information is only accessible to authorized users
b) Information remains accurate and unaltered
c) Information is available when needed
d) Information cannot be repudiated
b) Information remains accurate and unaltered
Which of the answers listed below refers to a secure replacement for Telnet?
a. CHAP (Challenge-Handshake Authentication Protocol)
b. FTP (File Transfer Protocol)
c. SNMP (Simple Network Management Protocol)
d. SSH (Secure Shell)
d. SSH (Secure Shell)
Which of the following is an example of physical security?
a) Encrypting a hard drive
b) Using antivirus software
c) Installing surveillance cameras
d) Applying software patches
c) Installing surveillance cameras
Which security measure involves using multiple methods to verify a user's identity?
a) Single Sign-On
b) Multi-factor Authentication
c) Kerberos
d) UAC (User Account Control)
b) Multi-factor Authentication
Which of the following is an example of ensuring availability?
a) Encrypting sensitive data
b) Using checksums to verify file integrity
c) Implementing redundant servers
d) Using digital signatures for emails
c) Implementing redundant servers
The SMTP protocol is used for: (Select 2 answers)
a. Sending email between mail servers
b. Name resolution
c. Serving of web pages
d. Retrieving email from mail servers
e. Sending email from a client device
a. Sending email between mail servers
e. Sending email from a client device
What type of malware replicates itself to spread to other computers?
a) Virus
b) Worm
c) Trojan Horse
d) Rootkit
b) Worm
Which of the following helps maintain data integrity?
a) Encrypting data
b) Using checksums
c) Implementing firewalls
d) Installing antivirus software
b) Using checksums
What is the principle of least privilege?
a) Giving users the maximum access possible
b) Denying access to all users
c) Granting users only the access they need to perform their jobs
d) Allowing users to change their access levels
Granting users only the access they need to perform their jobs
What is the function of FTP?
a. Mail services
b. Serving of web pages
c. Directory access
d. File exchange
d. File exchange
A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as:
a. RDP (Remote Desktop Protocol)
b. SSH (Secure Shell)
c. Telnet
d. RSH (Remote Shell)
a. RDP (Remote Desktop Protocol)
Which type of backup includes all data that has changed since the last full backup?
a) Full Backup
b) Incremental Backup
c) Differential Backup
d) Snapshot Backup
c) Differential Backup
Which term describes a potential cause of an unwanted impact on a system?
a) Vulnerability
b) Risk
c) Threat
d) Attack
c) Threat
POP3 is used for:
a. Name resolution
b. Sending email messages
c. File exchange
d. Email retrieval
d. Email retrieval
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?
a. NTP (Network Time Protocol)
b. VTP (VLAN Trunking Protocol)
c. NNTP (Network News Transfer Protocol)
d. RTP (Real-Time Transport Protocol)
a. NTP (Network Time Protocol)
What is the role of a firewall in network security?
a) Encrypting data in transit
b) Monitoring and controlling network traffic
c) Performing software updates
d) Managing user accounts
b) Monitoring and controlling network traffic