Network 1
Network 2
Network 3
Network 4
100

What is the primary goal of confidentiality in information security? 

a) Ensuring data is accurate and complete

b) Ensuring data is accessible when needed

c) Ensuring data is only accessible to authorized users

d) Ensuring users cannot deny their actions

c) Ensuring data is only accessible to authorized users

100

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

a. TFTP (Trivial File Transfer Protocol)
b. SSH (Secure Shell)
c. Telnet
d. RDP (Remote Desktop Protocol)

b. SSH (Secure Shell)

100

Which protocol allows for retrieving contents of an Internet page from a web server?

a. SNMP (Simple Network Management Protocol)
b. HTTP (Hypertext Transfer Protocol)
c. SMTP (Simple Mail Transfer Protocol)
d. IMAP (Internet Message Access Protocol)

b. HTTP (Hypertext Transfer Protocol)

100

Which attack involves writing more data to a buffer than it can hold? 

a) SQL Injection
b) Buffer Overflow
c) Cross-Site Scripting (XSS)
d) Man-in-the-Middle (MITM)

b) Buffer Overflow

200

What does the integrity principle in security ensure?

a) Information is only accessible to authorized users
b) Information remains accurate and unaltered
c) Information is available when needed
d) Information cannot be repudiated

b) Information remains accurate and unaltered

200

Which of the answers listed below refers to a secure replacement for Telnet?


a. CHAP (Challenge-Handshake Authentication Protocol)
b. FTP (File Transfer Protocol)
c. SNMP (Simple Network Management Protocol)
d. SSH (Secure Shell)

d. SSH (Secure Shell)

200

Which of the following is an example of physical security?

 a) Encrypting a hard drive
b) Using antivirus software
c) Installing surveillance cameras
d) Applying software patches

c) Installing surveillance cameras

200

Which security measure involves using multiple methods to verify a user's identity?

 a) Single Sign-On
b) Multi-factor Authentication
c) Kerberos
d) UAC (User Account Control)

b) Multi-factor Authentication

300

Which of the following is an example of ensuring availability?

 a) Encrypting sensitive data
b) Using checksums to verify file integrity
c) Implementing redundant servers
d) Using digital signatures for emails

c) Implementing redundant servers

300

The SMTP protocol is used for: (Select 2 answers)

a. Sending email between mail servers
b. Name resolution
c. Serving of web pages
d. Retrieving email from mail servers
e. Sending email from a client device

a. Sending email between mail servers

e. Sending email from a client device

300

What type of malware replicates itself to spread to other computers?

 a) Virus
b) Worm
c) Trojan Horse
d) Rootkit

b) Worm

300

Which of the following helps maintain data integrity?

 a) Encrypting data
b) Using checksums
c) Implementing firewalls
d) Installing antivirus software

b) Using checksums

400

What is the principle of least privilege?

a) Giving users the maximum access possible
b) Denying access to all users
c) Granting users only the access they need to perform their jobs
d) Allowing users to change their access levels

Granting users only the access they need to perform their jobs

400

What is the function of FTP?

a. Mail services
b. Serving of web pages
c. Directory access
d. File exchange

d. File exchange

400

A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as:

a. RDP (Remote Desktop Protocol)
b. SSH (Secure Shell)
c. Telnet
d. RSH (Remote Shell)

a. RDP (Remote Desktop Protocol)

400

Which type of backup includes all data that has changed since the last full backup? 

a) Full Backup
b) Incremental Backup
c) Differential Backup
d) Snapshot Backup

c) Differential Backup

500

Which term describes a potential cause of an unwanted impact on a system? 

a) Vulnerability
b) Risk
c) Threat
d) Attack

c) Threat

500

POP3 is used for:

a. Name resolution
b. Sending email messages
c. File exchange
d. Email retrieval

d. Email retrieval

500

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?

a. NTP (Network Time Protocol)
b. VTP (VLAN Trunking Protocol)
c. NNTP (Network News Transfer Protocol)
d. RTP (Real-Time Transport Protocol)

a. NTP (Network Time Protocol)

500

What is the role of a firewall in network security? 

a) Encrypting data in transit
b) Monitoring and controlling network traffic
c) Performing software updates
d) Managing user accounts

b) Monitoring and controlling network traffic

M
e
n
u