Section 2: IT Security Fundamentals Flashcards

(18 cards)

1
Q

Type: Question & Answer
Question: What security principle ensures that sensitive information is only accessed by those with authorisation and kept away from unauthorised individuals?

A

Answer: Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type: Multiple Choice Question (Select ONE answer)
Question: Which of the following is a primary method for maintaining Confidentiality in IT security?
A) Implementing redundancy in systems
B) Using hashing algorithms for data verification
C) Applying strong encryption to data
D) Ensuring physical access to servers

A

Answer: C) Applying strong encryption to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type: True/False
Question: Integrity in the CIA Triad primarily focuses on ensuring data is always available to authorised users.

A

Answer: False (Integrity focuses on accuracy and reliability, preventing unauthorised changes.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type: Multiple Choice Question (Select ONE answer)
Question: Which of the following is crucial for maintaining data integrity?
A) Secure communication channels
B) Data consistency
C) Backup systems
D) Access control lists for physical entry

A

Answer: B) Data consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type: Multiple Choice Question (Select ALL that apply)
Question: Which of the following are methods used to maintain Availability in IT systems?
A) Redundancy
B) Fault Tolerance
C) Encryption
D) Backup Systems

A

Answer: A, B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type: True/False
Question: The CIA Triad stands for Confidentiality, Integrity, and Authentication.

A

Answer: False (It stands for Confidentiality, Integrity, and Availability.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type: Question & Answer
Question: Which element of the DAD Triad refers to the unauthorised access and exposure of information?

A

Answer: Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type: Multiple Choice Question (Select ONE answer)
Question: When unauthorised changes are made to data, it represents a loss of integrity, which corresponds to which element of the DAD Triad?
A) Disclosure
B) Alteration
C) Denial
D) Destruction

A

Answer: B) Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type: True/False
Question: Denial, in the DAD Triad, directly attacks the availability principle by making information inaccessible.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type: Question & Answer
Question: What security concept ensures that a party in communication cannot deny the authenticity of their signature on a document or a message sent by them?

A

Answer: Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type: Multiple Choice Question (Select ONE answer)
Question: Non-repudiation is typically implemented using:
A) Symmetric encryption
B) Digital signatures
C) Firewall rules
D) Physical access controls

A

Answer: B) Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type: Question & Answer
Question: What is the process of verifying a user’s identity, device, or any other entity in a computer system, often involving passwords or biometrics?

A

Answer: Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type: Multiple Choice Question (Select ONE answer)
Question: After a user successfully authenticates, the system determines what resources and actions they are allowed to perform. This process is called:
A) Accounting
B) Identification
C) Authorisation
D) Auditing

A

Answer: C) Authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type: True/False
Question: The “Accounting” component of the AAA framework involves keeping track of activities to monitor logs of a user’s actions for auditing purposes.

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Type: Multiple Choice Question (Select ONE answer)
Question: A methodical assessment that compares an organisation’s current security posture with established standards and regulatory requirements to identify areas for improvement is known as a:
A) Risk assessment
B) Vulnerability scan
C) Gap analysis
D) Penetration test

A

Answer: C) Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Type: Multiple Choice Question (Select ONE answer)
Question: Strict identity verification, least privilege access, Multi-Factor Authentication (MFA), and monitoring/logging all traffic are concepts associated with:
A) Traditional perimeter security
B) Zero Trust
C) Discretionary Access Control
D) Physical security

A

Answer: B) Zero Trust

17
Q

Type: Question & Answer
Question: What modern security philosophy requires verification of access each time, assuming no inherent trust inside or outside the network perimeter?

A

Answer: Zero Trust

18
Q

Type: True/False
Question: In a Zero Trust model, once a user is authenticated, they are automatically granted full access to all network resources.

A

Answer: False (Zero Trust requires continuous verification and adherence to least privilege.)