Trắc nghiệm - ATTT
Trắc nghiệm - ATTT
I. Chapter 1
4. What is the primary goal of security in the context of information systems?
II. Chapter 2
1. What is the primary goal of a "Denial of Service" (DoS) attack?
a. Unauthorized access to sensitive data
b. Altering data without detection
c. Disrupting or degrading system availability
d. Bypassing firewalls
2. Which type of attack involves tricking individuals into divulging sensitive
information, such as passwords or credit card numbers?
a. Denial of Service (DoS)
b. Spoofing
c. Phishing
d. Man-in-the-Middle (MitM)
3. What is the purpose of a "Brute Force" attack in information security?
a. Gaining unauthorized access by exploiting system vulnerabilities
b. Decrypting encrypted data through trial and error
c. Disrupting network communication
d. Infecting systems with malicious software
4. Which of the following is a characteristic of a "Zero-Day" exploit?
a. It targets previously unknown vulnerabilities
b. It relies on social engineering techniques
c. It only affects outdated software
d. It requires physical access to the target system
5. What is the main goal of a "Man-in-the-Middle" (MitM) attack?
a. Disrupting network communication
b. Intercepting and possibly altering communication between two parties
c. Crashing a system by overwhelming it with traffic
d. Exploiting software vulnerabilities to gain unauthorized access
III. Chapter 3
1. Which of the following is considered sensitive personal information?
a. Name and address
b. Eye color
c. Favorite hobby
d. Pet's name
IV. Chapter 5
1. What is the first step in the risk management process?
=> Risk identification
2. What does the term “risk mitigation” involve in risk management?
=> Reducing the impact or likelihood of a risk
V. Chapter 6
1. What is the primary purpose of authentication in information security?
=> Verifying the identity of users or systems
2. Which of the following is an example of a “knowledge-based” authentication factor?
=> Username (something you know)
3. What is the main disadvantage of using only a password for authentication?
=> It can be easily guessed or cracked
VI. Chapter 7
4. What is the primary purpose of an Intrusion Detection and Prevention
System (IDPS)?
a. Encrypting sensitive data
b. Detecting and responding to security threats
c. Managing network bandwidth
d. Providing secure user authentication
5. Which type of IDPS focuses on identifying patterns of suspicious behavior
on a network?
a. Network-based IDPS
b. Host-based IDPS
c. Signature-based IDPS
d. Anomaly-based IDPS
VII. Chapter 8
11. What does WPA stand for in the context of mobile technology?