Which term describes converting readable data into a coded format to protect it from unauthorized access?
- Encryption
- Authentication
- Hashing
- Authorization
Encryption | Practical Use: Protecting credit card numbers during online purchases. | Explanation: Encryption secures data by transforming it into unreadable code unless decrypted with the proper key. | Objective: 4.1 – Logical security | Follow-up Question: What’s the difference between encryption and hashing?
Which type of encryption protects information while it is being transferred across a network?
- Data archived
- Data in transit
- Data replicated
- Data at rest
Data in transit | Practical Use: HTTPS encrypting web traffic to prevent eavesdropping. | Explanation: Data in transit encryption protects data as it moves between endpoints. | Objective: 4.1 – Logical security | Follow-up Question: What protocol is commonly used to encrypt data in transit on websites?
Which type of encryption protects stored files on a hard drive or USB stick?
- Data at rest
- Data in transit
- Data cached
- Data mirrored
Data at rest | Practical Use: Full Disk Encryption (BitLocker) securing a laptop hard drive. | Explanation: Encryption at rest prevents unauthorized access to stored information. | Objective: 4.1 – Logical security | Follow-up Question: Why is encrypting laptops especially important for organizations?
What is the primary purpose of a digital certificate?
- Provide physical device authentication
- Encrypt stored files
- Generate hashing algorithms
- Verify identity and enable secure communication
Verify identity and enable secure communication | Practical Use: Websites using SSL/TLS certificates to prove legitimacy. | Explanation: Certificates bind a public key to an entity to ensure trust in communications. | Objective: 4.1 – Certificates | Follow-up Question: What’s the difference between a trusted CA certificate and a self-signed one?
Which framework manages the creation, distribution, and revocation of digital certificates?
- SSL
- RADIUS
- Public Key Infrastructure (PKI)
- LDAP
Public Key Infrastructure (PKI) | Practical Use: PKI supports digital signatures and secure web browsing. | Explanation: PKI provides the structure for managing certificates and keys. | Objective: 4.1 – Certificates | Follow-up Question: What role does a Certificate Authority (CA) play in PKI?
Which type of certificate is created and signed by the same organization using it?
- Domain certificate
- Self-signed certificate
- PKI certificate
- CA-issued certificate
Self-signed certificate | Practical Use: Internal testing environments. | Explanation: Self-signed certificates encrypt data but are not trusted by outside parties. | Objective: 4.1 – Certificates | Follow-up Question: Why are self-signed certificates not recommended for public websites?
Which framework manages digital identities and controls user access to resources?
- IAM (Identity and Access Management)
- PKI
- LDAP
- MFA
IAM (Identity and Access Management) | Practical Use: Controlling employee access to corporate applications. | Explanation: IAM enforces policies to ensure the right people have the right access. | Objective: 4.1 – IAM | Follow-up Question: How does IAM help with regulatory compliance?
Which process validates a user’s identity before allowing system access?
- Authentication
- Role assignment
- Encryption
- Authorization
Authentication | Practical Use: Entering a password to log in to an account. | Explanation: Authentication ensures a person is who they claim to be. | Objective: 4.1 – IAM | Follow-up Question: What’s the difference between authentication and authorization?
Which security method requires multiple factors such as a password and a fingerprint?
- SSO
- Role-based access
- MFA
- PKI
MFA | Practical Use: Banking apps requiring a password + SMS code. | Explanation: MFA strengthens security by requiring two or more verification methods. | Objective: 4.1 – IAM | Follow-up Question: What are the three categories of authentication factors?
Which method allows a user to log in once and access multiple applications without re-entering credentials?
- RADIUS
- LDAP
- SSO
- MFA
SSO (Single Sign-On) | Practical Use: Logging into Microsoft 365 and gaining access to Outlook, Teams, and SharePoint. | Explanation: SSO reduces login fatigue and improves security. | Objective: 4.1 – IAM | Follow-up Question: Why can SSO create a single point of failure if not secured?
Which protocol provides centralized authentication, authorization, and accounting (AAA)?
- LDAP
- PKI
- TACACS+
- RADIUS
RADIUS | Practical Use: ISPs verifying customer logins. | Explanation: RADIUS authenticates users and tracks usage across networks. | Objective: 4.1 – IAM | Follow-up Question: How does RADIUS differ from TACACS+?
Which protocol is designed to access and maintain distributed directory information services?
- SAML
- PKI
- RADIUS
- LDAP
LDAP | Practical Use: Managing user accounts in Active Directory. | Explanation: LDAP organizes and provides access to directory-based user info. | Objective: 4.1 – IAM | Follow-up Question: What port does LDAP typically use?
Which open standard allows identity providers to share authentication data with service providers?
- MFA
- PKI
- SAML
- LDAP
SAML | Practical Use: Using Google to log into a third-party application. | Explanation: SAML exchanges authentication/authorization information between systems. | Objective: 4.1 – IAM | Follow-up Question: How does SAML help with federated identity management?
Which protocol separates authentication, authorization, and accounting for granular access control?
- LDAP
- SAML
- TACACS+
- RADIUS
TACACS+ | Practical Use: Managing admin access to Cisco network devices. | Explanation: TACACS+ provides flexible, detailed access control. | Objective: 4.1 – IAM | Follow-up Question: Why might TACACS+ be preferred over RADIUS in device management?
Which authentication method generates time-limited codes that expire after a short duration?
- RBAC
- Time-based authentication
- MFA
- SAML
Time-based authentication | Practical Use: Using Google Authenticator for one-time passcodes. | Explanation: Time-based codes reduce risk by limiting the window for unauthorized use. | Objective: 4.1 – IAM | Follow-up Question: How does time-based authentication strengthen MFA?
Which concept determines what actions a user can take after login?
- MFA
- Authentication
- Encryption
- Authorization
Authorization | Practical Use: A user can view files but not delete them. | Explanation: Authorization assigns permissions to users after authentication. | Objective: 4.1 – IAM | Follow-up Question: How do authorization and least privilege relate?
Which principle requires that users only have the minimum access needed to perform their jobs?
- Least privilege
- MFA
- SSO
- RBAC
Least privilege | Practical Use: A finance clerk can only access payroll, not HR or IT systems. | Explanation: Least privilege reduces accidental/malicious misuse of access. | Objective: 4.1 – IAM | Follow-up Question: What is a risk of not applying least privilege?
Which method assigns permissions based on a person’s job responsibilities?
- MFA
- RBAC
- RADIUS
- SSO
RBAC (Role-Based Access Control) | Practical Use: HR staff can access HR systems, but not finance. | Explanation: RBAC groups permissions by role, simplifying admin. | Objective: 4.1 – IAM | Follow-up Question: How does RBAC simplify large organizations?
Which technology uses GPS or Wi-Fi boundaries to control access or trigger actions?
- Geofencing
- RBAC
- PKI
- RADIUS
Geofencing | Practical Use: Banking app requiring login only within a country. | Explanation: Geofencing sets a virtual perimeter for access control. | Objective: 4.1 – Logical security | Follow-up Question: Why might geofencing be useful in BYOD policies?
Which physical security tool provides real-time monitoring and acts as a deterrent to intruders?
- Locks
- Honeypots
- Geofencing
- Security cameras
Security cameras | Practical Use: CCTV in data centers. | Explanation: Cameras deter unauthorized entry and record evidence. | Objective: 4.1 – Physical security | Follow-up Question: What is a potential limitation of relying only on cameras?
Which physical measure controls who can physically access rooms or devices?
- RBAC
- Cameras
- MFA
- Locks
Locks | Practical Use: Badge-controlled server room doors. | Explanation: Locks prevent unauthorized physical access to sensitive areas. | Objective: 4.1 – Physical security | Follow-up Question: How can electronic locks enhance security compared to traditional locks?
Which decoy system is designed to attract attackers and study their methods?
- IDS
- Honeynet
- Honeypot
- Firewall
Honeypot | Practical Use: Fake server deployed to collect attacker behavior. | Explanation: Honeypots mislead attackers and gather intelligence. | Objective: 4.1 – Deception technologies | Follow-up Question: Why are honeypots risky if not isolated properly?
Which decoy involves an entire network of honeypots to study coordinated attacks?
- DMZ
- VPN
- Honeynet
- IDS
Honeynet | Practical Use: Research environments studying attacker patterns. | Explanation: Honeynets expand deception with multiple fake systems. | Objective: 4.1 – Deception technologies | Follow-up Question: How can honeynets improve overall defense strategies?
Which term describes the potential for loss if a threat exploits a vulnerability?
- Risk
- Exploit
- CIA
- Threat
Risk | Practical Use: Storing unencrypted data on laptops creates high risk. | Explanation: Risk = likelihood × impact of a security event. | Objective: 4.1 – Common terminology | Follow-up Question: How do organizations reduce risk?