NSCT – Security Fundamentals & Principles MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . The primary goal of information security is to protect: (A) Hardware only (B) Software only (C) Information and systems from unauthorized access (D) Only internet connectionsShow All Answers 2. . The three main principles of information security are known as: (A) XYZ Principle (B) ABC Model (C) CIA Triad (D) Security Triangle 3. . In the CIA Triad, “C” stands for: (A) Control (B) Confidentiality (C) Computer (D) Communication 4. . In the CIA Triad, “I” stands for: (A) Integrity (B) Internet (C) Information (D) Identity 5. . In the CIA Triad, “A” stands for: (A) Access (B) Availability (C) Authentication (D) Authorization 6. . Confidentiality means: (A) Data is available anytime (B) Data is accurate and complete (C) Data is protected from unauthorized access (D) Data is deleted automatically 7. . Integrity in information security ensures that: (A) Data is always public (B) Data remains accurate and unchanged (C) Data is copied many times (D) Data is deleted regularly 8. . Availability means that: (A) Data is hidden (B) Data is destroyed (C) Data is accessible to authorized users when needed (D) Data is encrypted always 9. . Authentication is the process of: (A) Deleting files (B) Verifying the identity of a user (C) Installing software (D) Formatting a computer 10. . Authorization means: (A) Deleting passwords (B) Checking computer speed (C) Giving permission to access resources (D) Sending emails 11. . Which of the following is an example of authentication? (A) Mouse and speaker (B) Monitor and keyboard (C) Printer and scanner (D) Username and password 12. . The principle of “Least Privilege” means: (A) Users should get maximum access (B) Users should get only the access necessary to perform their job (C) Users should have no access (D) Everyone should share passwords 13. . Non-repudiation ensures that: (A) Internet speed increases (B) Data is deleted quickly (C) Computers run faster (D) A user cannot deny performing an action 14. . A security policy is: (A) A type of antivirus (B) A set of rules for protecting information (C) A computer hardware device (D) A programming language 15. . Risk in cyber security refers to: (A) The size of data (B) The speed of a computer (C) The possibility of loss or damage (D) The number of users 16. . A threat is defined as: (A) A storage device (B) A type of software (C) A network cable (D) Anything that can cause harm to a system 17. . A vulnerability is: (A) A weakness that can be exploited by attackers (B) A strength in the system (C) A type of firewall (D) A secure password 18. . Which principle ensures that users are properly identified before accessing a system? (A) Encryption (B) Authentication (C) Compression (D) Formatting 19. . Which of the following is a method to maintain confidentiality? (A) Encryption (B) Printing (C) Scanning (D) Copying 20. . The main purpose of security principles is to: (A) Increase internet speed (B) Protect information systems and data (C) Reduce computer size (D) Install more software