Question: Which of the following is the process of ensuring that a user cannot deny having performed a particular action?

Answer Choices: Integrity

Confidentiality

Non-repudiation

Availability

Answer: Non-repudiation

Question: Which of the following is a type of malicious code that spreads without attaching itself to a host file?

Answer Choices: Worm

Virus

Trojan horse

Rootkit

Answer: Worm

Question: Which of the following is a specialized form of phishing that targets specific individuals or organizations?

Answer Choices: Spear phishing

Pharming

Spoofing

Sniffing

Answer: Spear phishing

Question: Which of the following is considered the strongest form of authentication?

Answer Choices: Single-factor authentication

Two-factor authentication

Multifactor authentication

Password authentication

Answer: Multifactor authentication

Question: Which of the following is designed to provide secure remote login over an unsecured network?

Answer Choices: SSH

Telnet

FTP

HTTP

Answer: SSH

Question: Which of the following is an example of physical social engineering?

Answer Choices: Tailgating into a secure facility

Sending phishing emails

Conducting a denial-of-service attack

Performing SQL injection

Answer: Tailgating into a secure facility

Question: Which of the following security practices ensures that data is only available to those who are authorized to access it?

Answer Choices: Confidentiality

Integrity

Availability

Accountability

Answer: Confidentiality

Question: Which of the following types of hackers explore computer systems for fun or learning without malicious intent?

Answer Choices: Black hat

White hat

Grey hat

Script kiddie

Answer: Grey hat

Question: Which of the following is a legal framework that requires companies to protect consumers’ personal information and privacy?

Answer Choices: GDPR

HIPAA

SOX

FERPA

Answer: GDPR

Question: Which of the following is an advantage of biometric authentication?

Answer Choices: It can be easily shared with others

It is unique to the individual and difficult to forge

It requires no hardware support

It is weaker than passwords

Answer: It is unique to the individual and difficult to forge

Question: Which of the following is a type of security test in which ethical hackers attempt to exploit vulnerabilities?

Answer Choices: Penetration testing

Unit testing

Regression testing

System testing

Answer: Penetration testing

Question: Which of the following is a common method of securing wireless networks?

Answer Choices: WEP

WPA2

Open Wi-Fi

No encryption

Answer: WPA2

Question: Which of the following is a physical security measure for protecting information systems?

Answer Choices: Encryption

Firewall

Locked server rooms

Antivirus software

Answer: Locked server rooms

Question: Which of the following is a disadvantage of biometric authentication?

Answer Choices: It is unique to each person

It requires additional hardware and may raise privacy concerns

It cannot be forgotten

It is always 100% accurate

Answer: It requires additional hardware and may raise privacy concerns

Question: Which of the following is a network security system that controls incoming and outgoing network traffic based on predetermined rules?

Answer Choices: Firewall

IDS

VPN

Proxy

Answer: Firewall