Unit 1 - Practice Quiz

INT242

1 Which component of the CIA Triad ensures that information is not disclosed to unauthorized individuals, processes, or devices?

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity

2 In the context of information security, what does Non-repudiation guarantee?

A. Data is accessible when needed
B. The sender cannot deny having sent the message
C. The data has not been altered in transit
D. The identity of the user is hidden

3 Which of the following is an example of a Technical (Logical) Control?

A. Security Policy Manual
B. Perimeter Fence
C. Firewall Access Control List (ACL)
D. Security Awareness Training

4 A disgruntled employee intentionally deletes critical database files. What type of threat actor does this represent?

A. Script Kiddie
B. Insider Threat
C. Hacktivist
D. Advanced Persistent Threat (APT)

5 What defines the total sum of vulnerabilities and exposure points that an attacker can use to enter a system?

A. Attack Vector
B. Attack Surface
C. Threat Matrix
D. Risk Appetite

6 Which social engineering attack specifically targets high-profile individuals like CEOs or CFOs?

A. Phishing
B. Vishing
C. Whaling
D. Dumpster Diving

7 In cryptography, which concept implies that the output should look completely different from the input, even if the input changes slightly?

A. Confusion
B. Diffusion
C. Collision
D. Salting

8 If User A wants to send an encrypted message to User B using Asymmetric Encryption for confidentiality, which key does User A use to encrypt the data?

A. User A's Private Key
B. User A's Public Key
C. User B's Private Key
D. User B's Public Key

9 Which mathematical operation is fundamental to the Diffie-Hellman key exchange protocol?

A. Integer Factorization
B. Discrete Logarithms
C. Elliptic Curve integration
D. XOR summation

10 What is the primary function of a Hash Function?

A. To encrypt data for confidentiality
B. To compress data for storage
C. To map data of arbitrary size to fixed-size values
D. To exchange private keys securely

11 Which of the following algorithms is a Symmetric cipher?

A. RSA
B. AES
C. ECC
D. Diffie-Hellman

12 In the context of PKI, what is the role of a Certificate Authority (CA)?

A. To store the user's private key
B. To issue and verify digital certificates
C. To generate random session keys
D. To act as a firewall for the network

13 What is Steganography?

A. Scrambling text to make it unreadable
B. Hiding the existence of data within another file
C. Creating a digital signature
D. Verifying the identity of a sender

14 Which principle states that a subject should be given only those privileges necessary to complete its task?

A. Separation of Duties
B. Least Privilege
C. Defense in Depth
D. Security through Obscurity

15 Which attack involves an attacker following an authorized person into a secure area without their knowledge?

A. Tailgating
B. Dumpster Diving
C. Shoulder Surfing
D. Phishing

16 What type of malware demands payment to restore access to the victim's data?

A. Spyware
B. Ransomware
C. Adware
D. Rootkit

17 What is the result of the XOR operation: ?

A. 1
B.
C. 2
D. 10

18 Which component of AAA controls what a user is allowed to do after they have been identified?

A. Authentication
B. Authorization
C. Accounting
D. Audit

19 RSA security is based on the computational difficulty of which mathematical problem?

A. Elliptic Curve Discrete Logarithm
B. Integer Factorization of large prime products
C. Knapsack Problem
D. Traveling Salesman Problem

20 Which standard format is used for Digital Certificates?

A. X.509
B. PKCS#7
C. PGP
D. Kerberos

21 What is a Zero-Day vulnerability?

A. A vulnerability fixed 0 days ago
B. A flaw known to the vendor but not the public
C. A flaw unknown to the software vendor/developer
D. A virus that deletes data in 0 days

22 Which type of control is a security camera (CCTV) primarily considered?

A. Preventive
B. Detective
C. Corrective
D. Compensating

23 In cryptography, what is Salting?

A. Adding random data to a password before hashing
B. Encrypting the hash with a private key
C. Using two different algorithms
D. Repeating the hashing process multiple times

24 Which of the following is a characteristic of Symmetric Encryption?

A. It uses two different keys
B. It is slower than asymmetric encryption
C. It faces a key distribution problem
D. It provides non-repudiation naturally

25 What is the block size of AES (Advanced Encryption Standard)?

A. 64 bits
B. 128 bits
C. 192 bits
D. 256 bits

26 Who are Script Kiddies?

A. Highly skilled state-sponsored hackers
B. Hackers who write their own zero-day exploits
C. Unskilled attackers using existing tools/scripts
D. Insiders with database access

27 What does a Digital Signature provide?

A. Confidentiality and Availability
B. Integrity and Non-repudiation
C. Authorization and Encryption
D. Compression and Speed

28 Which mechanism checks the revocation status of a digital certificate in real-time?

A. CRL (Certificate Revocation List)
B. OCSP (Online Certificate Status Protocol)
C. CSR (Certificate Signing Request)
D. CA (Certificate Authority)

29 Which attack involves an attacker inserting themselves between two communicating parties to intercept or alter data?

A. DoS (Denial of Service)
B. Man-in-the-Middle (MitM)
C. SQL Injection
D. Brute Force

30 What is the primary motivation of a Hacktivist?

A. Financial Gain
B. Political or Social Cause
C. National Security
D. Curiosity

31 Which hashing algorithm is currently considered insecure due to collision vulnerabilities?

A. SHA-256
B. SHA-3
C. MD5
D. Whirlpool

32 In the context of Block Ciphers, what is Padding?

A. Adding extra bits to the key to increase strength
B. Adding data to the plaintext to fill the last block
C. Removing bits to compress the file
D. Encrypting the data twice

33 Which security concept relies on layering multiple defensive mechanisms?

A. Single Point of Failure
B. Defense in Depth
C. Open Design
D. Obfuscation

34 What is Vishing?

A. Video Phishing
B. Voice Phishing
C. Virtual Phishing
D. Visual Phishing

35 Which cryptographic solution provides Perfect Forward Secrecy (PFS)?

A. RSA
B. Ephemeral Diffie-Hellman (DHE/ECDHE)
C. MD5
D. Static AES

36 What is the output length of the SHA-256 algorithm?

A. 128 bits
B. 160 bits
C. 256 bits
D. 512 bits

37 Which control is designed to restore systems and data after a security incident?

A. Preventive
B. Detective
C. Corrective
D. Deterrent

38 In the CIA Triad, ensuring that data is accurate and free from tampering refers to:

A. Confidentiality
B. Integrity
C. Availability
D. Authorization

39 What is a Supply Chain Attack?

A. Attacking the physical shipping trucks
B. Compromising a third-party vendor to breach the target
C. Stealing supplies from the office
D. Denying power supply to the server room

40 Which of the following is a stream cipher?

A. AES
B. DES
C. RC4
D. RSA

41 What distinguishes Elliptic Curve Cryptography (ECC) from RSA?

A. ECC uses larger keys for same security
B. ECC provides the same security with smaller key sizes
C. ECC is a symmetric algorithm
D. ECC cannot be used for digital signatures

42 What is the 'Chain of Trust' in PKI?

A. A blockchain ledger
B. The hierarchy of CAs verifying each other up to a Root CA
C. The cable locking a server to the rack
D. The link between the user and their password

43 Which type of physical security control is a Mantrap?

A. Preventive
B. Detective
C. Administrative
D. Logical

44 What is Social Engineering?

A. Hacking into social media servers
B. Manipulating people into divulging confidential information
C. Analyzing social networks for data mining
D. Building engineering teams socially

45 What is the primary difference between a Threat and a Vulnerability?

A. A threat is a weakness; a vulnerability is a potential danger
B. A threat is a potential danger; a vulnerability is a weakness
C. They are synonyms
D. A threat is internal; a vulnerability is external

46 In a Digital Signature process using RSA, which key is used to sign the hash of the message?

A. Sender's Private Key
B. Sender's Public Key
C. Receiver's Private Key
D. Receiver's Public Key

47 What is Pretexting in social engineering?

A. Searching through trash
B. Creating a fabricated scenario to steal information
C. Looking over someone's shoulder
D. Following someone through a door

48 Which principle suggests that the security of a cryptosystem should not depend on the secrecy of the algorithm itself?

A. Kerckhoffs's Principle
B. Moore's Law
C. Murphy's Law
D. Principle of Least Privilege

49 What is the specific risk associated with Quantum Computing regarding current cryptography?

A. It will make symmetric keys too large
B. It can solve factorization and discrete log problems efficiently
C. It creates more hash collisions
D. It slows down internet traffic

50 Which of the following best describes Data at Rest?

A. Data traveling over the network
B. Data currently being processed by RAM
C. Data stored on a hard drive or backup tape
D. Data displayed on a monitor