Question: Which of the following is a security principle requiring multiple layers of defense so that if one fails, others will still provide protection?

Answer Choices: Principle of least privilege

Defense in depth

Confidentiality principle

Availability principle

Answer: Defense in depth

Question: Which of the following protocols is considered insecure and should not be used for remote system access?

Answer Choices: SSH

Telnet

HTTPS

SFTP

Answer: Telnet

Question: Which of the following protocols is primarily used for receiving email?

Answer Choices: IMAP

FTP

SMTP

HTTP

Answer: IMAP

Question: Which U.S. law focuses on protecting the privacy of student education records?

Answer Choices: HIPAA

FERPA

SOX

CCPA

Answer: FERPA

Question: Which of the following is a type of malicious software that restricts access to data or systems until a ransom is paid?

Answer Choices: Ransomware

Worm

Virus

Spyware

Answer: Ransomware

Question: Which of the following is a secure replacement for Telnet?

Answer Choices: SSH

FTP

HTTP

SMTP

Answer: SSH

Question: Which of the following is designed to exploit vulnerabilities in software by sending more data than the buffer can handle?

Answer Choices: Buffer overflow

Spoofing

Worm

Trojan horse

Answer: Buffer overflow

Question: Which of the following is a method of ensuring secure communication over the internet using encryption protocols?

Answer Choices: HTTP

HTTPS

FTP

Telnet

Answer: HTTPS

Question: Which of the following is an important step in protecting mobile devices?

Answer Choices: Disabling encryption

Avoiding software updates

Using strong PINs or biometrics

Disabling screen locks

Answer: Using strong PINs or biometrics

Question: Which of the following is a European Union regulation focused on data protection and privacy?

Answer Choices: SOX

HIPAA

GDPR

CCPA

Answer: GDPR

Question: Which of the following is a government regulation focused on protecting patients’ healthcare data?

Answer Choices: GDPR

HIPAA

SOX

FERPA

Answer: HIPAA

Question: Which U.S. law was enacted to improve corporate governance and accountability in financial reporting?

Answer Choices: FERPA

GDPR

SOX

HIPAA

Answer: SOX

Question: Which of the following protocols is primarily used for sending email?

Answer Choices: HTTP

SMTP

FTP

SNMP

Answer: SMTP

Question: Which of the following is a cyberattack that involves overwhelming a database with too many queries?

Answer Choices: Cross-site scripting (XSS)

SQL injection

Denial-of-service attack

Buffer overflow

Answer: Denial-of-service attack

Question: Which of the following is NOT a good cybersecurity practice when using Wi-Fi?

Answer Choices: Connecting to open public Wi-Fi without protection

Using a VPN when on public Wi-Fi

Securing your home Wi-Fi with a strong password

Disabling Wi-Fi when not in use

Answer: Connecting to open public Wi-Fi without protection