General Security Concepts | Test-5
This section focuses on evaluating foundational security practices and principles across the entire system. Tests include assessing the applicationโs adherence to the CIA triad (Confidentiality, Integrity, and Availability), evaluating security policies, and verifying compliance with industry standards and regulations. It also covers risk management processes, incident response readiness, data classification, and the use of secure development frameworks. Additionally, this section examines overall security awareness and the applicationโs resilience to common threats such as malware, insider threats, and social engineering attacks.
1 / 15
1. Which of the following is not a threat agent?
Professionals who conduct security audits and assessments to evaluate and ensure compliance with security policies and standards.
2 / 15
2. Replacingย a software with known vulnerabilities with a newer version is an example of risk:
Risk avoidance is a risk management strategy that involves taking actions to completely eliminate or withdraw from activities, processes, or situations that pose potential risks. This strategy aims to prevent exposure to certain risks by avoiding any actions or decisions that could lead to those risks.
3 / 15
3. Testing for the randomness of session identifiers and the presence of auditing capabilities ensures presence of the following security control?
Ensuring the randomness of session identifiers enhances the security of authentication processes, while the presence of auditing capabilities supports accountability, anomaly detection, and compliance with security policies and regulations. These measures collectively contribute to Non-repudiation
4 / 15
4. __________ is a structured and iterative forecasting or decision-making method that involves gathering input from a group of experts anonymously and then using a facilitator to present a summary of their opinions for further feedback. The process continues until a consensus or convergence of opinions is reached.
Correct Answer: Delphi Technique
The Delphi Technique is a structured and iterative forecasting or decision-making method that involves gathering input from a group of experts anonymously. A facilitator then presents a summary of their opinions, and the experts provide further feedback based on this summary. This process continues through multiple rounds until a consensus or convergence of opinions is reached.
Explanation of other options:
5 / 15
5. __________ is a systematic method for analyzing and visually representing the potential causes of a specific undesirable event or system failure. It uses a tree-like structure to break down complex events into contributing factors, helping identify the root causes and pathways that lead to the undesired outcome. It is commonly used in risk assessment and safety engineering to understand and mitigate the factors that can lead to failures or accidents.
Correct Answer: Fault Tree Analysis (FTA)
Fault Tree Analysis (FTA) is a systematic method for analyzing and visually representing the potential causes of a specific undesirable event or system failure. It uses a tree-like structure to break down complex events into contributing factors, helping identify the root causes and pathways that lead to the undesired outcome. FTA is commonly used in risk assessment, safety engineering, and reliability engineering to understand and mitigate factors that can lead to failures or accidents.
6 / 15
6. Which of the following software licenses types restrict reverse-engineering?
Freeware is a proprietary software that is available for use at no monetary cost. May be used without payment but may usually not be modified, re-distributed or reverse-engineered without the author’s permission
7 / 15
7. What is Two-man control or four-eyes principle?
Correct Answer: Two persons review and approve the work of each other, for every sensitive operations.
The Two-man control or four-eyes principle is a security measure where two persons review and approve each otherโs work for every sensitive operation. This principle is designed to prevent errors, fraud, or unauthorized actions by ensuring that no single individual has complete control over a critical task.
8 / 15
8. ________ is an undocumented access path through a system. This typically bypasses the normal security mechanisms and is to plant any of the malicious code forms
A trapdoor, in the context of cybersecurity, refers to a hidden and unauthorized entry point or vulnerability in a software application or system. It allows privileged access without going through standard authentication processes.
9 / 15
9. Which of the following is NOT the job of the data custodian?
Determine who needs the information and circumstances for release is the job of the Data/Information owner
10 / 15
10. What is the formula for Total Risk?
Likelihood represents the probability or likelihood of the risk event occurring.
Impactย represents the consequence or impact of the risk event if it does occur.
11 / 15
11. You received an email from Bill, your senior manager, about a deal with one of the clients. You comply with the request to accept the offer. After a week, Bill disputes ever having sent a letter. What kind of security measure do you need to “prove” that Bill was the one who sent the email?
Non-Repudiation is the right term to describe the above question
12 / 15
12. Which of the following best describes the core principle of the Zero Trust security model?
Correct Answer: Always verify, never trust – Trust is granted only after rigorous verification, regardless of whether the user is inside or outside the network.
The Zero Trust security model operates on the principle of “Always verify, never trust.” It means that trust is not automatically granted based on the location of the user (inside or outside the network). Instead, every user and device must be rigorously verified and authenticated before being granted access to resources, regardless of their location.
13 / 15
13. Is true quantitative risk analysis possible to achieve?
A truly quantitative risk analysis in information security faces several challenges, making it difficult to achieve complete quantification. Here are some reasons why achieving a fully quantitative risk analysis is challenging due to Uncertain data, complexity of systems, human factors etc.
14 / 15
14. Which phrase among the following BEST sums up the level of risk that persists after vulnerabilities are identified and countermeasures are implemented?
The correct answer is “Residual risk.”
Residual risk refers to the level of risk that remains after vulnerabilities have been identified and countermeasures (or mitigating actions) have been implemented. It’s the risk that persists even after all efforts to reduce or eliminate risk have been made, as no system is entirely free of risk.
The other terms do not specifically capture the risk remaining after mitigation measures:
15 / 15
15. A tool used to communicate and enforce organizational and management goals and objectives at a high level is a known as:
The correct answer is “Policy.”
A policy is a tool used to communicate and enforce organizational and management goals and objectives at a high level. Policies provide a formal framework for decision-making and set the direction for the organization in areas such as security, compliance, and operations. They are typically broad and strategic, guiding how an organization operates and ensuring alignment with its goals.
Your score is
The average score is 0%
Restart Test
Related challenges :