inthernat
ssd
cpu
comper
lock
100


1. Which technology allows a user to log in once and gain access to multiple different systems without being prompted for a password again?

Single Sign-On (SSO)

100

In Active Directory, where should you place users if you want to apply a specific security policy to only one department (e.g., Marketing)?

An Organizational Unit (OU)



100

 Which malware type is self-replicating and spreads across a network without any human interaction?

Worm

100

You are removing "Bloatware" from a new company laptop. How does this improve security?

It reduces the "Attack Surface" by having fewer lines of code to exploit




100

 What is the primary purpose of a "Kensington Lock"?

 What is the primary purpose of a "Kensington Lock"?

200

What is the primary purpose of a "Mantrap" in physical security?

To prevent unauthorized entry or tailgating via two interlocking doors




200

What does the "Padlock" icon in a browser's address bar signify?

The website is owned by a verified government entity




200

A "Bollard" is a sturdy vertical post designed to protect against which type of attack?

Vehicle ramming



200

Malicious code delivered through legitimate advertising networks




 What is "Malvertising"?

200

Which browser mode only prevents data from being saved locally on the device, rather than making the user invisible to their ISP?

Incognito / InPrivate



300

Which Windows feature should be disabled to prevent a malicious USB (such as a Rubber Ducky) from running a script the moment it is plugged in?

AutoRun / AutoPlay



300

Which biometric metric describes the "Insult Rate," where a legitimate user is incorrectly denied access?

Which biometric metric describes the "Insult Rate," where a legitimate user is incorrectly denied access?

300

Which hardware chip is required to securely store encryption keys and ensure a drive cannot be read if the hardware is tampered with?

Which hardware chip is required to securely store encryption keys and ensure a drive cannot be read if the hardware is tampered with?

300

 In physical security, "Tailgating" refers to:

Following an employee into a secure building without them noticing



300

Which type of malware hides deep within the OS Kernel or BIOS, making it extremely difficult to detect?

Rootkit

400

Which type of malware is a collection of "zombie" computers controlled by a central server?

Botnet

400

Which of the following is the ONLY 100% safe way to ensure data is destroyed on a Solid State Drive (SSD)?

Shredding/Pulverizing



400

 Which type of cookie is primarily used by advertisers to track a user across multiple different websites?

 Which type of cookie is primarily used by advertisers to track a user across multiple different websites?

400

Which security feature prevents "Rootkits" from loading during the startup process by verifying digital signatures?

Secure Boot



400

 Why should you rename the default "Administrator" account on a Windows workstation?

To prevent hackers from knowing the exact username for a brute-force attack




500

Which security principle ensures that a user is provided with only the minimum permissions necessary to perform their specific job?

Principle of Least Privilege



500

Which authentication factor is represented by a fingerprint or retina scan?

Something You Are



500

What is the most effective way to prevent "walk-up" attacks on an unattended workstation?

Configuring an automatic screensaver lock (e.g., after 2 minutes)



500

If a computer's fans are running at max speed and CPU usage is at 100% while idle, what malware is likely present?

Cryptominer (Cryptojacking)




500

 When evaluating biometric scanners, which value represents the most accurate system?

The lowest possible CER