Extensive Question Bank for Exam
Prep (2026/2027)
What is the primary goal of a security awareness program?
Answer:- To change user behavior and reduce human-related risks
Which type of access control allows the owner of an object to grant permissions to
others?
Answer:- Discretionary Access Control (DAC)
What is the most important reason for implementing the principle of least
privilege?
Answer:- To limit the potential damage from accidents or malicious actions
Which security control is considered a deterrent control?
Answer:- Warning banners
What is the main purpose of a security audit?
Answer:- To verify compliance with security policies
Which type of malware self-propagates across a network without user
intervention?
Answer:- Worm
What is the difference between a threat and a vulnerability?
Answer:- A threat is a potential danger; a vulnerability is a weakness
,Which hashing algorithm produces a 160-bit digest and is considered more secure
than MD5?
Answer:- SHA-1
What is the primary purpose of a digital signature?
Answer:- To provide non-repudiation and integrity
Which layer of the OSI model does a router operate at?
Answer:- Network layer (Layer 3)
What is the function of a non-disclosure agreement (NDA)?
Answer:- To protect confidential information from being shared
Which type of backup only copies files that have changed since the last full
backup?
Answer:- Incremental backup
What is the primary purpose of a security information and event management
(SIEM) system?
Answer:- To aggregate and analyze log data for threat detection
Which of the following best describes a business impact analysis (BIA)?
Answer:- Identifies critical functions and recovery priorities
What is the main advantage of symmetric encryption over asymmetric encryption?
Answer:- Speed
Which access control model uses roles to determine permissions?
Answer:- Role-Based Access Control (RBAC)
What is the purpose of a warm site in disaster recovery?
Answer:- A partially equipped facility that can be operational within hours
, Which protocol is used to provide secure remote shell access?
Answer:- SSH
What is a rainbow table attack?
Answer:- Using precomputed hash values to crack passwords
Which of the following is an example of administrative control?
Answer:- Security policy
What is the function of a honeypot?
Answer:- To attract and trap attackers for analysis
Which type of firewall inspects the entire packet payload and understands
application-layer protocols?
Answer:- Next-generation firewall (NGFW)
What is the purpose of a split-tunnel VPN?
Answer:- Only traffic destined for the corporate network goes through the
VPN
Which of the following is a characteristic of a stateful firewall?
Answer:- Tracks active connections
What is the main risk of using default credentials on network devices?
Answer:- Unauthorized access by attackers
Which type of attack involves sending more traffic than a system can handle?
Answer:- Denial-of-service (DoS)
What is the purpose of a security baseline?
Answer:- A minimum standard of security configuration