A _______ is a set of predefined rules in a firewall that determines whether to allow or block specific traffic.

  • Access Control List (ACL)
  • DNS Server
  • Encryption Algorithm
  • Intrusion Detection System
An Access Control List (ACL) is a set of rules used in a firewall to control traffic by allowing or blocking based on defined criteria.

The process of converting encrypted data back into its original form is termed as _______.

  • Deciphering
  • Encoding
  • Encryption
  • Hashing
The process of converting encrypted data back into its original form is termed as "Deciphering." This process uses the decryption key to transform the encrypted data into its original, readable format.

Which of the following is NOT a recommended practice to prevent SQL injection?

  • Sanitizing Input
  • Storing Passwords in Plain Text
  • Using Dynamic Queries
  • Using Prepared Statements
Using dynamic queries is not recommended to prevent SQL injection. It opens the door to SQL injection attacks by allowing user input directly in SQL queries.

In the context of operating systems, what does the principle of "least privilege" refer to?

  • Giving users the highest level of access rights
  • Providing maximum system resources to all users
  • Providing system access based on need
  • Denying system access to all users
The principle of "least privilege" (also known as the principle of least privilege, or POLP) refers to providing system access based on the principle of "need to know" and giving users the minimum levels of access rights required to accomplish their tasks. This reduces the risk of unauthorized access and potential security breaches.

In the context of encryption, what ensures that data remains unchanged from its source and has not been accidentally or maliciously altered?

  • Data Authentication
  • Data Availability
  • Data Confidentiality
  • Data Integrity
Data Integrity, in encryption, ensures that data remains unchanged from its source and has not been accidentally or maliciously altered. This is vital to ensure the trustworthiness of data in transit or storage.

Firewalls that operate at the network layer and make decisions based on IP addresses are called _______ firewalls.

  • Application Firewall
  • Packet Filtering Firewall
  • Proxy Firewall
  • Stateful Firewall
Packet Filtering Firewalls operate at the network layer and make decisions based on IP addresses and ports.

Which type of malware typically does not replicate itself but allows unauthorized access to the affected computer?

  • Trojan
  • Worm
  • Virus
  • Spyware
A Trojan horse (option 1) is a type of malware that disguises itself as a legitimate software or file to trick users into downloading it. Unlike viruses or worms, Trojans typically do not replicate themselves. Once executed, they can provide unauthorized access to the affected computer.

What is the primary purpose of a digital signature in electronic documents?

  • Data Compression
  • Data Duplication
  • Data Encryption
  • Ensuring Authenticity
The primary purpose of a digital signature in electronic documents is to ensure authenticity. It provides a way to verify that the document has not been tampered with and that it was indeed signed by the claimed sender. Digital signatures use cryptographic techniques to achieve this.

What is the most common motivation behind insider threats in an organization?

  • Accidental actions
  • Defending against external threats
  • Lack of security measures
  • Personal gain
The most common motivation behind insider threats is personal gain. This can include financial gain, revenge against the organization, or selling sensitive information to third parties. Understanding these motivations is essential for preventing and mitigating insider threats.

A company's incident reporting procedure mandates the use of a specific platform for logging incidents to ensure traceability and accountability. This is an example of what kind of control?

  • Administrative Control
  • Physical Control
  • Preventive Control
  • Technical Control
This is an example of an Administrative Control. Administrative controls are measures and policies put in place to manage and regulate security practices. In this case, mandating the use of a specific platform is an administrative measure to ensure traceability and accountability when logging incidents.