InSem Midterm MCQ
InSem Midterm MCQ
1. Which of the following best describes the CIA Triad in information security?
a) Confidentiality, Identification, Accessibility
b) Control, Integrity, Availability
c) Confidentiality, Integrity, Availability
d) Classification, Integrity, Authentication
2. What is the primary goal of confidentiality in information security?
a) Ensuring data is accessible only to authorized users
b) Guaranteeing data remains accurate and unaltered
c) Ensuring system uptime and availability
d) Preventing data from being encrypted
3. Integrity ensures that:
a) Data is only accessible by authorized users
b) Data remains accurate and is not tampered with
c) Systems remain available during high demand
d) Data is backed up regularly
4. An information security policy is important because it:
a) Defines how firewalls are configured
b) Establishes guidelines for protecting information assets
c) Ensures software updates are installed on time
d) Manages physical security measures
5. Which of the following is an example of a security control?
a) Firewall
b) Password policy
c) Data encryption
d) All of the above
6. A system ensuring data is accessible during an outage is focused on:
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
7. Non-repudiation in security ensures:
a) Data cannot be modified without detection
b) A user cannot deny their actions
c) Systems remain online
d) Only authorized users access data
1. Authentication verifies:
a) Who you are
b) What you can access
c) Data accuracy
d) Network availability
2. Which of the following is an example of multi-factor authentication (MFA)?
a) Username and password
b) Biometric scan only
c) Password and a one-time PIN
d) Security question only
3. Role-Based Access Control (RBAC) grants permissions based on:
a) The user's identity
b) The user's department
c) The user's job function
d) The user’s geographic location
4. What is the strongest form of authentication?
a) Passwords only
b) Security questions
c) Biometric data combined with PINs
d) CAPTCHA verification
5. Least privilege principle means:
a) Users have unlimited access
b) Users have access only to what they need
c) Administrators manage all data access
d) Everyone shares the same permissions
6. Access control lists (ACLs) define:
a) Security policies for data storage
b) Who can access specific resources
c) Encryption levels for sensitive files
d) Data integrity measures
7. Which of the following ensures data confidentiality during transmission?
a) Firewalls
b) Data encryption
c) Password policies
d) Access control mechanisms
4. Cryptography Basics
5. Network Security