Question 1
Which of the following best defines the CIA Triad in cybersecurity?
A framework that ensures data is not tampered with during transmission
A model focused on ensuring data is encrypted during storage and transfer
A strategy for securing user identities and ensuring login processes
A fundamental security model that protects Confidentiality, Integrity, and Availability of information
Question 2
What is the main purpose of ensuring Confidentiality in cybersecurity?
To ensure data is protected from malware and ransomware
To guarantee that only authorized individuals can access sensitive data
To provide users with the ability to modify and update system settings
To secure network resources from being overwhelmed by traffic
Question 3
Which of the following is the most common risk to data integrity in an organization?
Data is not encrypted, leading to unauthorized access
Unauthorized users intentionally modifying or corrupting data
Excessive backup storage creating bottlenecks
Delayed software updates causing poor performance
Question 4
How does a Hash Function verify data integrity?
By comparing encrypted versions of data
By logging every user interaction with the data
By generating a unique hash value that changes every time data is modified
By measuring the amount of data transmitted over a network
Question 5
Which of these is an effective countermeasure for DoS/DDoS attacks aimed at ensuring Availability?
Deploying firewall rules to filter traffic
Encrypting data with the latest hashing algorithms
Implementing robust VPNs to secure data transmission
Regular hardware upgrades to prevent resource exhaustion
Question 6
Which step ensures Authorization is successfully carried out after Authentication?
Granting a user specific permissions based on their role
Verifying the identity of a user through multi-factor authentication
Enabling network firewalls to prevent unauthorized access
Encrypting all user data before granting access
Question 7
What distinguishes Authorization from Authentication in a secure system?
Authentication is based on access control policies, while Authorization is about verifying identity
Authentication is the process of identifying a user, while Authorization controls what resources the user can access
Authentication grants access, while Authorization denies access
Authentication requires passwords, while Authorization involves fingerprint scanning
Question 8
What is the Principle of Least Privilege (PoLP) primarily designed to minimize?
The number of system administrators with elevated access
The risk of security breaches by minimizing unnecessary access rights
The time users spend in accessing sensitive data
The number of authentication factors required for access
Question 9
Which of the following would be a physical control in a Defense-in-Depth strategy?
Regular software updates to patch security vulnerabilities
Implementing firewalls to filter network traffic
Biometric scans and access badges to prevent unauthorized entry
Using intrusion detection systems to monitor suspicious activity
Question 10
What is the key benefit of Defense-in-Depth in cybersecurity?
Relying on a single strong security control to prevent attacks
Increasing the complexity of user authentication
Layering multiple security measures to minimize the impact of a successful attack
Encrypting all internal communications within a network
There are 10 questions to complete.