Question: Which of the following is a security principle requiring multiple layers of defense so that if one fails, others will still provide protection?
Answer Choices: Principle of least privilege
Defense in depth
Confidentiality principle
Availability principle
Answer: Defense in depth
Question: Which of the following protocols is considered insecure and should not be used for remote system access?
Answer Choices: SSH
Telnet
HTTPS
SFTP
Answer: Telnet
Question: Which of the following protocols is primarily used for receiving email?
Answer Choices: IMAP
FTP
SMTP
HTTP
Answer: IMAP
Question: Which U.S. law focuses on protecting the privacy of student education records?
Answer Choices: HIPAA
FERPA
SOX
CCPA
Answer: FERPA
Question: Which of the following is a type of malicious software that restricts access to data or systems until a ransom is paid?
Answer Choices: Ransomware
Worm
Virus
Spyware
Answer: Ransomware
Question: Which of the following is a secure replacement for Telnet?
Answer Choices: SSH
FTP
HTTP
SMTP
Answer: SSH
Question: Which of the following is designed to exploit vulnerabilities in software by sending more data than the buffer can handle?
Answer Choices: Buffer overflow
Spoofing
Worm
Trojan horse
Answer: Buffer overflow
Question: Which of the following is a method of ensuring secure communication over the internet using encryption protocols?
Answer Choices: HTTP
HTTPS
FTP
Telnet
Answer: HTTPS
Question: Which of the following is an important step in protecting mobile devices?
Answer Choices: Disabling encryption
Avoiding software updates
Using strong PINs or biometrics
Disabling screen locks
Answer: Using strong PINs or biometrics
Question: Which of the following is a European Union regulation focused on data protection and privacy?
Answer Choices: SOX
HIPAA
GDPR
CCPA
Answer: GDPR
Question: Which of the following is a government regulation focused on protecting patients’ healthcare data?
Answer Choices: GDPR
HIPAA
SOX
FERPA
Answer: HIPAA
Question: Which U.S. law was enacted to improve corporate governance and accountability in financial reporting?
Answer Choices: FERPA
GDPR
SOX
HIPAA
Answer: SOX
Question: Which of the following protocols is primarily used for sending email?
Answer Choices: HTTP
SMTP
FTP
SNMP
Answer: SMTP
Question: Which of the following is a cyberattack that involves overwhelming a database with too many queries?
Answer Choices: Cross-site scripting (XSS)
SQL injection
Denial-of-service attack
Buffer overflow
Answer: Denial-of-service attack
Question: Which of the following is NOT a good cybersecurity practice when using Wi-Fi?
Answer Choices: Connecting to open public Wi-Fi without protection
Using a VPN when on public Wi-Fi
Securing your home Wi-Fi with a strong password
Disabling Wi-Fi when not in use
Answer: Connecting to open public Wi-Fi without protection