Question: Which of the following is the process of ensuring that a user cannot deny having performed a particular action?
Answer Choices: Integrity
Confidentiality
Non-repudiation
Availability
Answer: Non-repudiation
Question: Which of the following is a type of malicious code that spreads without attaching itself to a host file?
Answer Choices: Worm
Virus
Trojan horse
Rootkit
Answer: Worm
Question: Which of the following is a specialized form of phishing that targets specific individuals or organizations?
Answer Choices: Spear phishing
Pharming
Spoofing
Sniffing
Answer: Spear phishing
Question: Which of the following is considered the strongest form of authentication?
Answer Choices: Single-factor authentication
Two-factor authentication
Multifactor authentication
Password authentication
Answer: Multifactor authentication
Question: Which of the following is designed to provide secure remote login over an unsecured network?
Answer Choices: SSH
Telnet
FTP
HTTP
Answer: SSH
Question: Which of the following is an example of physical social engineering?
Answer Choices: Tailgating into a secure facility
Sending phishing emails
Conducting a denial-of-service attack
Performing SQL injection
Answer: Tailgating into a secure facility
Question: Which of the following security practices ensures that data is only available to those who are authorized to access it?
Answer Choices: Confidentiality
Integrity
Availability
Accountability
Answer: Confidentiality
Question: Which of the following types of hackers explore computer systems for fun or learning without malicious intent?
Answer Choices: Black hat
White hat
Grey hat
Script kiddie
Answer: Grey hat
Question: Which of the following is a legal framework that requires companies to protect consumers’ personal information and privacy?
Answer Choices: GDPR
HIPAA
SOX
FERPA
Answer: GDPR
Question: Which of the following is an advantage of biometric authentication?
Answer Choices: It can be easily shared with others
It is unique to the individual and difficult to forge
It requires no hardware support
It is weaker than passwords
Answer: It is unique to the individual and difficult to forge
Question: Which of the following is a type of security test in which ethical hackers attempt to exploit vulnerabilities?
Answer Choices: Penetration testing
Unit testing
Regression testing
System testing
Answer: Penetration testing
Question: Which of the following is a common method of securing wireless networks?
Answer Choices: WEP
WPA2
Open Wi-Fi
No encryption
Answer: WPA2
Question: Which of the following is a physical security measure for protecting information systems?
Answer Choices: Encryption
Firewall
Locked server rooms
Antivirus software
Answer: Locked server rooms
Question: Which of the following is a disadvantage of biometric authentication?
Answer Choices: It is unique to each person
It requires additional hardware and may raise privacy concerns
It cannot be forgotten
It is always 100% accurate
Answer: It requires additional hardware and may raise privacy concerns
Question: Which of the following is a network security system that controls incoming and outgoing network traffic based on predetermined rules?
Answer Choices: Firewall
IDS
VPN
Proxy
Answer: Firewall