T4Tutorials .PK

NSCT – Security Fundamentals & Principles MCQs

1. . The primary goal of information security is to protect:

(A) Hardware only


(B) Software only


(C) Information and systems from unauthorized access


(D) Only internet connections




2. . The three main principles of information security are known as:

(A) XYZ Principle


(B) ABC Model


(C) CIA Triad


(D) Security Triangle




3. . In the CIA Triad, “C” stands for:

(A) Control


(B) Confidentiality


(C) Computer


(D) Communication




4. . In the CIA Triad, “I” stands for:

(A) Integrity


(B) Internet


(C) Information


(D) Identity




5. . In the CIA Triad, “A” stands for:

(A) Access


(B) Availability


(C) Authentication


(D) Authorization




6. . Confidentiality means:

(A) Data is available anytime


(B) Data is accurate and complete


(C) Data is protected from unauthorized access


(D) Data is deleted automatically




7. . Integrity in information security ensures that:

(A) Data is always public


(B) Data remains accurate and unchanged


(C) Data is copied many times


(D) Data is deleted regularly




8. . Availability means that:

(A) Data is hidden


(B) Data is destroyed


(C) Data is accessible to authorized users when needed


(D) Data is encrypted always




9. . Authentication is the process of:

(A) Deleting files


(B) Verifying the identity of a user


(C) Installing software


(D) Formatting a computer




10. . Authorization means:

(A) Deleting passwords


(B) Checking computer speed


(C) Giving permission to access resources


(D) Sending emails




11. . Which of the following is an example of authentication?

(A) Mouse and speaker


(B) Monitor and keyboard


(C) Printer and scanner


(D) Username and password




12. . The principle of “Least Privilege” means:

(A) Users should get maximum access


(B) Users should get only the access necessary to perform their job


(C) Users should have no access


(D) Everyone should share passwords




13. . Non-repudiation ensures that:

(A) Internet speed increases


(B) Data is deleted quickly


(C) Computers run faster


(D) A user cannot deny performing an action




14. . A security policy is:

(A) A type of antivirus


(B) A set of rules for protecting information


(C) A computer hardware device


(D) A programming language




15. . Risk in cyber security refers to:

(A) The size of data


(B) The speed of a computer


(C) The possibility of loss or damage


(D) The number of users




16. . A threat is defined as:

(A) A storage device


(B) A type of software


(C) A network cable


(D) Anything that can cause harm to a system




17. . A vulnerability is:

(A) A weakness that can be exploited by attackers


(B) A strength in the system


(C) A type of firewall


(D) A secure password




18. . Which principle ensures that users are properly identified before accessing a system?

(A) Encryption


(B) Authentication


(C) Compression


(D) Formatting




19. . Which of the following is a method to maintain confidentiality?

(A) Encryption


(B) Printing


(C) Scanning


(D) Copying




20. . The main purpose of security principles is to:

(A) Increase internet speed


(B) Protect information systems and data


(C) Reduce computer size


(D) Install more software




Exit mobile version