1-11
1-11
1-11
1-11
100

The private key in asymmetric cryptography must be:  

   A. Kept secret to maintain security 

   B. Shared with everyone  

   C. Rotated weekly  

   D. Used for encryption only  

  A. Kept secret to maintain security  

100

Which attack targets password hashes using precomputed tables?  

   A. Brute force  

   B. Side channel  

   C. Rainbow table 

   D. Dictionary poisoning

C. Rainbow table

100

Which term describes the process of exchanging public keys securely?

    A. Key exchange 

    B. Key destruction  

    C. Key renewal  

    D. Certificate chaining

A. Key exchange

100

Which model enforces access by a central authority and uses data classification labels?  

    A. RBAC  

    B. DAC  

    C. MAC   

    D. Hybrid

C. MAC

200

Which algorithm is commonly used for secure key exchange but does not encrypt data? 

   A. RSA  

   B. ECC  

   C. Diffie-Hellman 

   D. SHA-256

C. Diffie-Hellman

200

Which of the following protocols uses cryptography to secure web traffic? 

   A. HTTPS   

   B. FTP  

   C. Telnet  

   D. SNMP

A. HTTPS

200

What caused the 2011 DigiNotar breach?

    A. Hardware failure  

    B. Poor password protocols and unpatched servers   

    C. Expired certificates  

    D. Network congestion

B. Poor password protocols and unpatched servers

200

Which model gives control to the object’s owner?  

    A. DAC   

    B. RBAC  

    C. MAC  

    D. Mandatory hybrid

A. DAC

300

Digital signatures provide: 

   A. Encryption and decryption  

   B. Authentication, integrity, and non-repudiation  

   C. Confidentiality only  

   D. Compression

B. Authentication, integrity, and non-repudiation

300

SSH is primarily used for:  

   A. Email encryption  

   B. File compression  

   C. Secure remote login and administration   

   D. Wireless authentication

C. Secure remote login and administration

300

Authorization determines:  

    A. Identity of the user  

    B. Password complexity  

    C. What resources the user can access  

    D. The encryption key length

C. What resources the user can access

300

A government system that uses clearance levels but allows personal file sharing likely uses: 

    A. RBAC  

    B. Hybrid (MAC + DAC)   

    C. Discretionary only  

    D. No access control

B. Hybrid (MAC + DAC)

400

A hash function produces: 

   A. Variable-length encrypted text  

   B. Fixed-length output from any input 

   C. Random numbers  

   D. Two-way reversible data

B. Fixed-length output from any input

400

IPsec protects data at which layer of the OSI model? 

   A. Application  

   B. Network  

   C. Session  

   D. Transport

B. Network 

400

Accounting in access control involves: 

    A. Assigning user roles  

    B. Logging and auditing user actions  

    C. Encrypting audit trails  

    D. Resetting passwords

B. Logging and auditing user actions

400

Data exfiltration means:  

    A. Securely deleting data  

    B. Stealing or exporting data from an organization   

    C. Accidental data entry  

    D. Data compression

B. Stealing or exporting data from an organization

500

Which of the following is not a property of a secure hash function?

   A. Deterministic  

   B. Collision-resistant  

   C. One-way  

   D. Reversible

D. Reversible 

500

What is the function of a Certificate Authority (CA)?

    A. Encrypts all user passwords  

    B. Manages VPN connections  

    C. Issues and revokes digital certificates   

    D. Stores private keys

C. Issues and revokes digital certificates

500

Which access control model assigns permissions based on user roles?  

    A. RBAC   

    B. DAC  

    C. MAC  

    D. Hybrid

A. RBAC

500

Data manipulation attacks: 

    A. Subtly alter data for malicious purposes 

    B. Encrypt data to lock users out  

    C. Exfiltrate large data sets  

    D. Overwrite disk sectors

A. Subtly alter data for malicious purposes