1. . Authentication in information security is the process of:
(A) Verifying the identity of a user or system
(B) Encrypting data
(C) Deleting files
(D) Installing software
2. . Which of the following is NOT a type of authentication?
(A) Firewall
(B) Biometric
(C) Two-factor
(D) Password-based
3. . Two-Factor Authentication (2FA) combines:
(A) Only a username
(B) Two passwords only
(C) Only a fingerprint
(D) Something you know and something you have
4. . Multi-Factor Authentication (MFA) adds:
(A) Only encryption
(B) Only faster internet
(C) One or more verification methods beyond 2FA
(D) Only system updates
5. . Biometric authentication includes:
(A) Username only
(B) Fingerprint, facial recognition, and iris scan
(C) Password only
(D) IP address filtering
6. . Access control ensures that:
(A) All users can access everything
(B) Users can access only resources they are authorized to use
(C) Files are deleted automatically
(D) Network speed is increased
7. . Role-Based Access Control (RBAC) assigns permissions based on:
(A) IP addresses
(B) Device type
(C) User roles
(D) File size
8. . Discretionary Access Control (DAC) allows:
(A) Resource owners to set access permissions
(B) System administrators only to set permissions
(C) No control for users
(D) Firewall to manage access
9. . Mandatory Access Control (MAC) is:
(A) Only for network devices
(B) Set by users individually
(C) Optional for files
(D) Controlled by the system based on security labels
10. . Principle of Least Privilege means:
(A) Users have only the minimum access needed for their tasks
(B) Users have full administrative access
(C) Everyone shares passwords
(D) Access is granted randomly
11. . Authentication can be strengthened using:
(A) Default system accounts
(B) Weak passwords
(C) Public Wi-Fi
(D) Strong passwords, MFA, and biometrics
12. . Single Sign-On (SSO) allows:
(A) Encrypting data automatically
(B) Deleting all accounts at once
(C) Users to access multiple systems with one set of credentials
(D) Logging out all users simultaneously
13. . Session management in access control ensures:
(A) Automatic file deletion
(B) Secure handling of user sessions
(C) Faster internet
(D) Installing software automatically
14. . Token-based authentication uses:
(A) Firewall rules
(B) Password only
(C) IP address filtering
(D) A unique token issued to a user for access
15. . Access control lists (ACLs) are used to:
(A) Increase CPU speed
(B) Encrypt files
(C) Delete old accounts
(D) Define permissions for users or groups on system resources
16. . Single-factor authentication relies on:
(A) One method of verification, usually a password
(B) Two passwords
(C) Biometrics only
(D) Firewall rules
17. . Privilege escalation attacks target:
(A) Gaining higher access than authorized
(B) Encrypting files
(C) Deleting malware
(D) Slowing internet speed
18. . Examples of authentication factors include:
(A) Knowledge, possession, inherence
(B) File type, browser, IP address
(C) Hardware only
(D) Network speed
19. . Session hijacking occurs when:
(A) Network speed increases
(B) Files are deleted automatically
(C) An attacker takes control of a user session
(D) System updates fail
20. . The main goal of authentication and access control is to:
(A) Ensure only authorized users can access resources
(B) Increase storage space
(C) Compress files
(D) Improve graphics