1. . The primary goal of information security is to protect:
(A) Hardware only
(B) Software only
(C) Information and systems from unauthorized access
(D) Only internet connections
2. . The three main principles of information security are known as:
(A) XYZ Principle
(B) ABC Model
(C) CIA Triad
(D) Security Triangle
3. . In the CIA Triad, “C” stands for:
(A) Control
(B) Confidentiality
(C) Computer
(D) Communication
4. . In the CIA Triad, “I” stands for:
(A) Integrity
(B) Internet
(C) Information
(D) Identity
5. . In the CIA Triad, “A” stands for:
(A) Access
(B) Availability
(C) Authentication
(D) Authorization
6. . Confidentiality means:
(A) Data is available anytime
(B) Data is accurate and complete
(C) Data is protected from unauthorized access
(D) Data is deleted automatically
7. . Integrity in information security ensures that:
(A) Data is always public
(B) Data remains accurate and unchanged
(C) Data is copied many times
(D) Data is deleted regularly
8. . Availability means that:
(A) Data is hidden
(B) Data is destroyed
(C) Data is accessible to authorized users when needed
(D) Data is encrypted always
9. . Authentication is the process of:
(A) Deleting files
(B) Verifying the identity of a user
(C) Installing software
(D) Formatting a computer
10. . Authorization means:
(A) Deleting passwords
(B) Checking computer speed
(C) Giving permission to access resources
(D) Sending emails
11. . Which of the following is an example of authentication?
(A) Mouse and speaker
(B) Monitor and keyboard
(C) Printer and scanner
(D) Username and password
12. . The principle of “Least Privilege” means:
(A) Users should get maximum access
(B) Users should get only the access necessary to perform their job
(C) Users should have no access
(D) Everyone should share passwords
13. . Non-repudiation ensures that:
(A) Internet speed increases
(B) Data is deleted quickly
(C) Computers run faster
(D) A user cannot deny performing an action
14. . A security policy is:
(A) A type of antivirus
(B) A set of rules for protecting information
(C) A computer hardware device
(D) A programming language
15. . Risk in cyber security refers to:
(A) The size of data
(B) The speed of a computer
(C) The possibility of loss or damage
(D) The number of users
16. . A threat is defined as:
(A) A storage device
(B) A type of software
(C) A network cable
(D) Anything that can cause harm to a system
17. . A vulnerability is:
(A) A weakness that can be exploited by attackers
(B) A strength in the system
(C) A type of firewall
(D) A secure password
18. . Which principle ensures that users are properly identified before accessing a system?
(A) Encryption
(B) Authentication
(C) Compression
(D) Formatting
19. . Which of the following is a method to maintain confidentiality?
(A) Encryption
(B) Printing
(C) Scanning
(D) Copying
20. . The main purpose of security principles is to:
(A) Increase internet speed
(B) Protect information systems and data
(C) Reduce computer size
(D) Install more software