1. Which technology allows a user to log in once and gain access to multiple different systems without being prompted for a password again?
Single Sign-On (SSO)
In Active Directory, where should you place users if you want to apply a specific security policy to only one department (e.g., Marketing)?
An Organizational Unit (OU)
Which malware type is self-replicating and spreads across a network without any human interaction?
Worm
You are removing "Bloatware" from a new company laptop. How does this improve security?
It reduces the "Attack Surface" by having fewer lines of code to exploit
What is the primary purpose of a "Kensington Lock"?
What is the primary purpose of a "Kensington Lock"?
What is the primary purpose of a "Mantrap" in physical security?
To prevent unauthorized entry or tailgating via two interlocking doors
What does the "Padlock" icon in a browser's address bar signify?
The website is owned by a verified government entity
A "Bollard" is a sturdy vertical post designed to protect against which type of attack?
Vehicle ramming
Malicious code delivered through legitimate advertising networks
What is "Malvertising"?
Which browser mode only prevents data from being saved locally on the device, rather than making the user invisible to their ISP?
Incognito / InPrivate
Which Windows feature should be disabled to prevent a malicious USB (such as a Rubber Ducky) from running a script the moment it is plugged in?
AutoRun / AutoPlay
Which biometric metric describes the "Insult Rate," where a legitimate user is incorrectly denied access?
Which biometric metric describes the "Insult Rate," where a legitimate user is incorrectly denied access?
Which hardware chip is required to securely store encryption keys and ensure a drive cannot be read if the hardware is tampered with?
Which hardware chip is required to securely store encryption keys and ensure a drive cannot be read if the hardware is tampered with?
In physical security, "Tailgating" refers to:
Following an employee into a secure building without them noticing
Which type of malware hides deep within the OS Kernel or BIOS, making it extremely difficult to detect?
Rootkit
Which type of malware is a collection of "zombie" computers controlled by a central server?
Botnet
Which of the following is the ONLY 100% safe way to ensure data is destroyed on a Solid State Drive (SSD)?
Shredding/Pulverizing
Which type of cookie is primarily used by advertisers to track a user across multiple different websites?
Which type of cookie is primarily used by advertisers to track a user across multiple different websites?
Which security feature prevents "Rootkits" from loading during the startup process by verifying digital signatures?
Secure Boot
Why should you rename the default "Administrator" account on a Windows workstation?
To prevent hackers from knowing the exact username for a brute-force attack
Which security principle ensures that a user is provided with only the minimum permissions necessary to perform their specific job?
Principle of Least Privilege
Which authentication factor is represented by a fingerprint or retina scan?
Something You Are
What is the most effective way to prevent "walk-up" attacks on an unattended workstation?
Configuring an automatic screensaver lock (e.g., after 2 minutes)
If a computer's fans are running at max speed and CPU usage is at 100% while idle, what malware is likely present?
Cryptominer (Cryptojacking)
When evaluating biometric scanners, which value represents the most accurate system?
The lowest possible CER