MIS 585 Cybersecurity quiz questions

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/115

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:18 AM on 5/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

116 Terms

1
New cards

What does a Next Generation Firewall (NGFW) do?

Identifies applications sending packets through the firewall

2
New cards

Which device is used to balance network traffic among multiple servers?

Load balancer

3
New cards

What is the primary purpose of a spam filter?

Block spam emails

4
New cards

What is a demilitarized zone (DMZ) in network security?

An exposed, network-separated area providing an additional layer of security

5
New cards

What technology creates a secure connection over the internet?

VPN

6
New cards

Which of the following is not a function of a traditional firewall?

Encrypting data

7
New cards

What does NAT stand for in network settings?

Network Address Translation

8
New cards

What is a primary function of web security gateways?

To block malicious web content in real time

9
New cards

Which firewall operates at a higher level by identifying applications?

Next Generation Firewall

10
New cards

What role does a proxy server play in a network?

It acts as an intermediary between end users and the internet

11
New cards

What is the purpose of Mandatory Access Control (MAC)?

To restrict access based on fixed security attributes

12
New cards

Which Access Control model uses roles to define access permissions?

Role-Based Access Control

13
New cards

What does the principle of Least Privilege entail?

Users should have the minimum access necessary to perform their duties

14
New cards

What is an Access Control List (ACL)?

A set of rules that defines permissions for a resource

15
New cards

What does RADIUS stand for?

Remote Authentication Dial-In User Service

16
New cards

What is the purpose of job rotation in security?

To limit the time individuals have to compromise security

17
New cards

Which of the following is true about Kerberos?

It is an authentication protocol

18
New cards

What is implicit deny in access control?

Automatically denying access unless a rule explicitly allows it

19
New cards

What distinguishes Discretionary Access Control (DAC) from other models?

It allows owners to control access

20
New cards

What is an example of Rule-Based Access Control?

Access based on a set of directives such as time of day

21
New cards

What is the primary purpose of physical security?

To protect corporate assets from threats such as unauthorized entry

22
New cards

What does an access control vestibule typically feature?

Two locking doors

23
New cards

How are physical access controls similar to technical system security?

They both depend on similar access control fundamentals

24
New cards

What can environmental design help enhance in terms of physical security?

Security and crime prevention

25
New cards

Which type of sensor detects unauthorized entry via pressure-based detection?

Pressure sensor

26
New cards

What is a bollard designed to prevent?

Vehicle intrusion

27
New cards

What is encoded into RFID tags?

Information that can be read by radio waves

28
New cards

Which type of lock uses biometrics as a method of entry?

Biometric lock

29
New cards

What does a smart card typically contain?

Encrypted access information

30
New cards

Which physical barrier is used to control the perimeter of a high-security area?

Bollards

31
New cards

What is the main goal of using surveillance cameras in physical security?

Recording events for safety and security

32
New cards

What type of attack could be mitigated by effective physical security controls?

Unauthorized entry

33
New cards

What is the function of an access list in a security system?

To list personnel authorized to enter a secure facility

34
New cards

Which is a common feature of environmental design used in physical security?

Use of robust and tall fencing

35
New cards

How does a proximity card function?

By being brought near a proximity reader

36
New cards

Which component is critical in a biometric lock system?

A fingerprint or iris scan

37
New cards

What is typically the first line of defense in physical security?

Physical barriers

38
New cards

Which of the following is NOT a type of sensor used in physical security systems?

LIDAR sensor

39
New cards

What role do smart cards play in physical security?

Access control

40
New cards

What does RFID stand for?

Radio Frequency Identification

41
New cards

Why is zoning important in physical security?

It segregates areas to manage different security levels

42
New cards

What is the purpose of lighting in physical security settings?

To deter unauthorized access and enhance surveillance

43
New cards

Which method is NOT used by proximity cards for communication?

Ultrasound

44
New cards

In physical security, what does the term 'authentication' refer to?

The process of checking a person’s credentials

45
New cards

What are bollards typically made of?

Steel or concrete

46
New cards

What is the primary function of a Certificate Authority (CA)?

Issue and revoke digital certificates

47
New cards

What does a Certificate Revocation List (CRL) contain?

List of revoked certificates

48
New cards

Which protocol is used to securely transmit data over the internet?

SSH

49
New cards

What type of digital certificate is used to verify the identity of software publishers?

Class 3

50
New cards

Which PKI trust model involves a single CA that all parties trust implicitly?

Hierarchical Trust Model

51
New cards

What is a common protocol used to manage network devices remotely?

SNMP

52
New cards

Which type of DNS attack involves altering the DNS records in DNS servers?

DNS Hijacking

53
New cards

What is the main function of 802.1x?

Port-based network access control

54
New cards

Which protocol is used to secure file transfers over the internet?

SFTP

55
New cards

What is the primary purpose of VLAN Management?

Segment network traffic

56
New cards

What is "Bluejacking"?

Sending unsolicited messages over Bluetooth

57
New cards

Which encryption protocol was designed to replace WEP?

WPA

58
New cards

What is the function of MAC address filtering in wireless security?

Prevents unauthorized network access

59
New cards

Which technology allows wireless networks to be separated from one another?

Wireless VLANs

60
New cards

What does WPA2-PSK stand for?

Wi-Fi Protected Access 2 - Pre-Shared Key

61
New cards

What is the purpose of a firewall in a network environment?

To control and filter incoming and outgoing network traffic

62
New cards

What technique involves attackers placing themselves between the client and server to intercept communications?

Man-in-the-middle attack

63
New cards

Which of the following is a sign of a DNS attack?

Redirects to malicious websites

64
New cards

Which method is used to ensure that data sent over the internet is secure and encrypted?

HTTPS

65
New cards

What is the primary benefit of using virtual private networks (VPN)?

Providing a secure connection over a public network

66
New cards

Which access control model grants permissions based on a user's job role?

Role-Based Access Control (RBAC)

67
New cards

The principle of "least privilege" means

Users receive only the minimum access needed for their tasks

68
New cards

What is the purpose of "implicit deny" in an ACL?

To block all traffic unless explicitly allowed

69
New cards

Which protocol is commonly used for centralized authentication in Windows environments?

Kerberos

70
New cards

Separation of duties is designed to prevent

Single points of failure in security processes

71
New cards

Which authentication factor is considered "something you have"?

Smart card

72
New cards

A strong password policy should

Enforce a minimum length of 15 characters

73
New cards

What is the primary weakness of SMS-based two-factor authentication?

It can be intercepted through SIM swapping

74
New cards

Which biometric authentication method analyzes typing patterns?

Behavioral biometrics

75
New cards

Single Sign-On (SSO) improves security by

Reducing password fatigue and reuse

76
New cards

RAID 5 provides fault tolerance by

Using parity information spread across disks

77
New cards

Which team is responsible for assessing physical damage after a disaster?

Damage Assessment Team

78
New cards

The chain of custody in forensics is important because it

Documents who handled evidence and when

79
New cards

What is the primary purpose of disaster recovery exercises?

To evaluate the effectiveness of the DRP

80
New cards

EMI shielding protects systems from

Electromagnetic interference

81
New cards

A company using both RBAC and biometric authentication is implementing

Defense in depth

82
New cards

Which control would best protect against both physical theft and data breaches?

Full-disk encryption

83
New cards

During a power outage, which business continuity strategy is most critical?

Backup generators

84
New cards

Job rotation enhances security by:

Preventing any single person from having too much control

85
New cards

A comprehensive security strategy should include

Both preventive and recovery controls

86
New cards

What does the acronym ALE stand for in risk management?

Annualized Loss Expectancy

87
New cards

Which type of risk management transfers responsibility to a third party?

Risk transference

88
New cards

Which type of control involves the human element and administrative activities?

Operational

89
New cards

The Single Loss Expectancy (SLE) is calculated using

AV × EF

90
New cards

What is the primary purpose of performing vulnerability assessment?

To identify what needs protection, evaluate threats, appraise vulnerabilities, and assess potential damage

91
New cards

A standard in security policy refers to:

Requirements specific to a system or procedure

92
New cards

An Acceptable Use Policy primarily addresses

How employees utilize company resources

93
New cards

What does a vulnerability scanner typically NOT perform?

Suggest improvements to application logic

94
New cards

What does the baseline report in vulnerability assessment compare?

Current state of a system to its established standard

95
New cards

What is the risk calculation that involves subjective judgment?

Qualitative analysis

96
New cards

Which of the following agreements is used primarily to define service expectations between organizations?

SLA (Service Level Agreement)

97
New cards

Banner grabbing tools are primarily used to:

Identify system information from services

98
New cards

In risk management, what does mitigation mean?

Making a risk less serious

99
New cards

Which type of policy specifically deals with data storage and retention?

Data Policy

100
New cards

Continuous security monitoring is part of:

Risk assessment