General Security Concepts | Test-1
This section focuses on evaluating foundational security practices and principles across the entire system. Tests include assessing the applicationโs adherence to the CIA triad (Confidentiality, Integrity, and Availability), evaluating security policies, and verifying compliance with industry standards and regulations. It also covers risk management processes, incident response readiness, data classification, and the use of secure development frameworks. Additionally, this section examines overall security awareness and the applicationโs resilience to common threats such as malware, insider threats, and social engineering attacks.
1 / 15
1. The principle and practice of keeping sensitive information private is known as:
Confidentiality is the assurance that sensitive information is protected from unauthorized access or disclosure.
2 / 15
2. What does a CIA triad stand for?
The CIA triad stands for Confidentiality, Integrity, and Availability, which are the core principles of information security:
These principles help organizations protect their data and systems from various security threats.
3 / 15
3. Which among the following is the BEST way to ensure confidentiality?
The correct answer is to apply hashing with salting to user passwords
Hashing with salting provides a secure way to store passwords by adding random data (the salt) to the password before hashing it. This ensures that even if two users have the same password, their stored hash values will differ, making it much harder for attackers to use precomputed tables (like rainbow tables) to crack passwords.
Explanation of Incorrect Options:
4 / 15
4. The resilient quality ย of a software to withstand attacks that attempts to modify or alter data in an unauthorized way is referred to as:
Integrity refers to the assurance that data or information remains complete, accurate, and unaltered throughout its lifecycle.
5 / 15
5. Which among the following can break Integrity of data?
Allowing multiple processes or threads to access the same data simultaneously can compromise integrity by: Leaving data in an inconsistent state, causing race conditions and data corruption. To prevent this, programmers, need to use Database locking and row versioning mechanisms.
6 / 15
6. Which of the following does not ensure integrity?
All the above ensures integrity, except Data Anonymization which is used to ensure confidentiality.
7 / 15
7. Which of the following needs can be satisfied by performing checksum validation?
By comparing the checksum of a received or stored data with the expected checksum, one can determine whether the data has been altered or corrupted during transmission or storage. If the checksum values do not match, it indicates that the data integrity has been compromised.
8 / 15
8. The goal where systems and data are available to authorized individuals when they need it and under any circumstances, including power outages or natural disasters is known as:
Availability ensures that systems and data are available all the time
9 / 15
9. Ensuring just confidentiality and Integrity is enough to sustain an information systems
Without availability, even if you have met the other two requirements of the CIA Triad, your business can be negatively impacted.
10 / 15
10. Which of the following attack types is a serious threat to availability of information systems?
DoS/DDOS attacks are a serious threat to availability of information systems as they can exhaust/overwhelm bandwidth and computing power of systems.
11 / 15
11. What is the highest data classification level for Government/military schemes:
Top Secret is the highest level of classification for Government/military environments.
12 / 15
12. What is the lowest data classification level in business/non-government entities:
Public is the lowest level of data classification in business/non-government sector.
13 / 15
13. Which of the following is NOT a Personally Identifiable Information (PII)?
A public IP address: While it can be used to approximate the location of a device, it does not directly identify an individual without additional context or information.
14 / 15
14. Which of the following defines a security policy?
An information security policy is a set of guidelines, rules, and procedures that outline how an organization manages and protects its information assets. It provides a framework for ensuring the confidentiality, integrity, and availability of information while addressing potential risks and defining responsibilities for employees and stakeholders.
15 / 15
15. What is reverse engineering?
Reverse engineering, often known as back engineering, is the practice of disassembling software, equipment, airplanes, architectural structures, and other goods in order to obtain design knowledge from them. Reverse engineering frequently entails disassembling individual components of bigger items
Your score is
The average score is 0%
Restart Test
Related challenges :