MCQ of CISO
MCQ of CISO
2. Which Linux component is responsible for starting the system and loading the
kernel?
a) init
b) GRUB
c) systemd
d) BIOS
3. What is the primary user interface for managing les and applications in Windows?
a) Command Line Interface (CLI)
b) GNOME
c) Start Menu and File Explorer
d) X Window System
8. What is the name of the default text editor in most Windows installations?
a) Nano
b) Vim
c) Notepad
d) Emacs
11. Which Registry hive contains information about the currently logged-in user?
a) HKEY_CLASSES_ROOT
b) HKEY_CURRENT_USER
c) HKEY_LOCAL_MACHINE
d) HKEY_USERS
12. Which of the following is a best practice for secure con guration in Windows?
a) Using complex passwords
b) Disabling unused services
c) Keeping the system and software updated
d) All of the above
13. Which Windows tool provides detailed information about hardware and software
resources on your computer?
a) Device Manager
b) System Information (msinfo32)
c) Control Panel
d) Task Manager
14. What is the function of the Windows Update service?
a) To manage user accounts
b) To keep the operating system and installed software up to date with the latest
patches and updates
c) To monitor system performance
d) To manage network connections
17 . Which Windows feature helps to detect and block potentially harmful software by
comparing les against a database of known threats?
a) Windows Defender Antivirus
b) Windows Update
c) Task Scheduler
d) Device Manager
18. In Group Policy, what does the term "GPO" stand for?
a) Group Policy Options
b) General Policy Object
c) Group Policy Object
d) Global Policy Organization
22. What is the potential risk of not applying security patches to applications?
a) Reduced application performance
b) Increased user satisfaction
c) Exposure to security vulnerabilities and potential attacks
d) Improved system stability
23. Which tool in Windows OS is commonly used to manage and apply updates to
Microsoft applications?
a) Device Manager
b) Task Manager
c) Windows Update
d) Control Panel
27. What is the primary purpose of auditing in Windows desktop and server systems?
a) To manage network connections
b) To monitor user activities and system events
c) To create new user accounts
d) To update device drivers
38. What is the primary purpose of Endpoint Detection and Response (EDR)
technology?
a) To manage network switches
b) To monitor and respond to endpoint threats and activities
c) To encrypt email communications
d) To con gure rewall rules
44. Which encryption method uses a single key for both encryption and decryption?
a) AES (Advanced Encryption Standard)
b) RSA (Rivest-Shamir-Adleman)
c) Symmetric encryption
d) Asymmetric encryption
45. What does end-to-end encryption (E2EE) ensure?
a) Encryption only during data transmission
b) Encryption from sender to receiver, protecting data throughout its entire journey
c) Encryption only on web browsers
d) Encryption at the server level
46. What role does antivirus software play in network security for end systems?
a) Encrypting network traf c
b) Monitoring system performance
c) Detecting and removing malware
d) Con guring network protocols
47. How can multi-factor authentication (MFA) enhance network security for end
systems?
a) By encrypting email communications
b) By requiring multiple forms of veri cation for user access
c) By optimizing database queries
d) By managing software licenses
48. What is the purpose of regularly updating software and security patches on end
systems?
a) To increase system performance
b) To enhance data encryption
c) To x security vulnerabilities and bugs
d) To con gure network settings
50. What does Role-Based Access Control (RBAC) rely on to assign permissions?
a) User identity and attributes
b) Physical device location
c) Network bandwidth
d) System uptime
52. Which access control model focuses on assigning permissions based on job roles
within an organization?
a) Role-Based Access Control (RBAC)
b) Mandatory Access Control (MAC)
c) Discretionary Access Control (DAC)
d) Attribute-Based Access Control (ABAC)
59. Which port does HTTPS typically use for secure web communications?
a) 80
b) 443
c) 22
d) 21
61. Which protocol is commonly used to establish secure connections over HTTP?
a) SSH (Secure Shell)
b) FTPS (FTP Secure)
c) SSL/TLS
d) Telnet
64. Which technology is commonly used to collect and centralize endpoint logs?
a) Firewall
b) SIEM (Security Information and Event Management)
c) VPN (Virtual Private Network)
d) Antivirus software
67. Which security measure helps secure mobile devices from unauthorized access?
a) VPN (Virtual Private Network)
b) Disk encryption
c) Antivirus software
d) Email ltering
68. Which authentication method is commonly used for mobile device security?
a) Biometric authentication
b) Password
c) Security token
d) Smart card
Week 2
Basics of Networks, routers rewalls
74. Which type of rewall operates at the application layer of the OSI model?
a) Packet- ltering rewall
b) Stateful inspection rewall
c) Proxy rewall
d) Network address translation (NAT) rewall
75. Which device is responsible for routing traf c between different VLANs?
a) Router
b) Switch
c) Firewall
d) Proxy server
IPv4 and IPv6 Sub-netting, Secure Network Design Case Studies, Network logs
(SNMP, Syslog) Bandwidth Monitoring
79. How many bits are used for the subnet portion in IPv4 addresses?
a) 8 bits
b) 16 bits
c) 24 bits
d) 32 bits
81. What is the main advantage of using IPv6 over IPv4 for subnetting?
a) IPv6 supports larger address space and simpli es subnetting
b) IPv6 is faster in routing packets
c) IPv6 encrypts all network traf c
d) IPv6 reduces the need for network rewalls
84. Which security principle involves limiting network exposure and minimizing attack
surface?
a) Least Privilege
b) Defense in Depth
c) Principle of Least Astonishment
d) Principle of Least Privilege
93. How does disabling SSID broadcasting enhance wireless network security?
a) By encrypting network traf c
b) By reducing network latency
c) By hiding the network name from unauthorized users
d) By optimizing system performance
IDS/IPS
96. How does an IPS (Intrusion Prevention System) differ from an IDS?
a) IPS encrypts network traf c, while IDS detects unauthorized access
b) IPS prevents detected threats, while IDS only alerts on threats
c) IPS manages network bandwidth, while IDS monitors network performance
d) IPS optimizes system performance, while IDS secures network printers
100. Which rewall type operates at the application layer of the OSI model?
a) Packet- ltering rewall
b) Stateful inspection rewall
c) Proxy rewall
d) Network address translation (NAT) rewall
DNS, DHCP, Router, Switch and VLAN Security, Proxy Deployment and WAF
Deployment
110. What security measure can protect routers and switches from unauthorized
access?
a) VLANs
b) MAC ltering
c) Firewall
d) Proxy server
117. What is the primary purpose of a Demilitarized Zone (DMZ) in network security?
A) To provide a high-speed connection between internal and external networks
B) To isolate and protect the internal network from external threats
C) To encrypt all traf c entering the network
D) To manage user access controls
118. How is traf c typically managed between the DMZ and the internal network?
A) Through unrestricted direct connections
B) Through a rewall with speci c access rules
C) Through a VPN
D) Through a proxy server
119. Which of the following con gurations best describes a dual-homed DMZ?
A) A DMZ that uses two separate rewalls for added security
B) A DMZ that allows direct access to the internal network
C) A DMZ that only hosts a single service
D) A DMZ with multiple subnets
Week 3
130. Which is not one of the three core principles of information security?
a) Con dentiality
b) Integrity
c) Availability
d) Redundancy
a) Backup
b) Encryption
c) Firewall
d) Patch management
133. Which term describes the process of ensuring that information is accurate and
reliable?
A) Con dentiality
B) Integrity
C) Availability
D) Authentication
a) Mitigating threats
b) Identifying threats
a) Preventive
b) Detective
c) Corrective
d) Compensating
a) SQL Injection
b) Phishing
c) DDoS
d) Man-in-the-Middle
139. Which security control aims to limit the impact of a security incident by restoring
normal operations?
A) Preventive control
B) Detective control
C) Corrective control
D) Deterrent control
Security Incidents and Attacks
141. Which phase of the incident response process involves identifying that an
incident has occurred?
a) Preparation
b) Identi cation
c) Containment
d) Recovery
a) Password vaulting
b) Data compression
a) To allow users to access multiple applications with one set of login credentials
150. Which document is commonly used to outline the security requirements and
expectations for a vendor?
A) Vendor Risk Management Policy
D) Financial Statement
151. During a vendor assessment, which method is used to evaluate the vendor's
security practices?
B) To ensure the vendor adheres to relevant laws, reducing legal and nancial risks
157. Which type of encryption uses the same key for both encryption and
decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Quantum encryption
a) Client-Server
b) Peer-to-Peer
c) Microservices
d) Ring Topology
a) Hypervisor
b) Graphics Card
a) Centralized management
a) Vendor lock-in
d) Simpli ed management
c) Network devices
a) Docker
b) Kubernetes
c) Apache
d) Nginx
a) Data redundancy
d) Hardware compatibility
d) Disabling logging
Week 4
Mobile Device Fundamentals, Mobile Device Management
195. What is the purpose of mobile application stores like Google Play and Apple App
Store?
A) To store user documents
B) To provide a marketplace for downloading and purchasing mobile applications
C) To offer technical support for mobile devices
D) To manage mobile device settings
Mobile Device Management
198. What can MDM solutions do to ensure device compliance with corporate
policies?
a) Block non-compliant devices from accessing corporate resources
b) Increase network bandwidth
c) Provide user training
d) Optimize cloud storage
A. Smartphone
B. Laptop
C. Desktop Computer
D. Smartwatch
A. Early 1990s
B. Early 2000s
C. Mid-2000s
D. Late 2010s
B. As a cost-saving measure
D. To reduce IT staff
D. IT support is optional
A. Share it freely
C. Delete it immediately
D. Store it unprotected
Location and Geo fencing Security, Bluetooth and Near Field Communication
(NFC) Security
209. Which technology is primarily used to determine a device’s location for geo-
fencing purposes?
a) Bluetooth
b) GPS
c) NFC
d) Wi-Fi
217. Which of the following can be a consequence of not applying patches on mobile
devices?
a) Improved battery life
b) Increased risk of security breaches
c) Enhanced device performance
d) Reduced device storage
Mobile Forensic
c) Blackmailing
a) Creating apps
221. As of June 2024, which is NOT one of the latest mobile operating systems?
a) Android 15
b) iOS 17
c) Windows Mobile 10
d) Tizen 6.5
222. Which component is NOT part of the anatomy of a mobile phone device?
a) Microprocessor
c) Hard Drive
a) Archiving
b) Identi cation
c) Intake
d) Processing
c) SMS
d) Ethernet logs
226. Which type of SIM card is embedded within devices like smartphones and
smartwatches?
a) Mini-SIM
b) Micro-SIM
c) Nano-SIM
d) eSIM
229. Which of the following is a common security concern for IoT devices?
a) High power consumption
b) Unsecured data transmission
c) Large storage capacity
d) High cost of devices
232. Which of the following best describes the principle of least privilege in IoT
security?
A) Ensuring all devices have the same access level
B) Giving devices the minimum level of access necessary to perform their functions
C) Allowing devices to automatically upgrade their permissions
D) Ensuring devices have maximum access to network resources
238. Which of the following is a preventive measure against SQL injection attacks?
A) Using strong passwords
B) Encrypting database connections
C) Validating and sanitizing user input
D) Implementing CAPTCHA
OWASP
246. Which of the following protocols is commonly used to secure web services?
a) HTTP
b) FTP
c) SOAP
d) HTTPS
251. Which of the following is a common method for securing data at rest?
A) Using strong passwords
B) Data encryption
C) Data compression
D) Data replication
Identity and Access Management (IAM), Incident Response and Forensics, Web
Application and Database Security Best Practices
259. What is the primary goal of Identity and Access Management (IAM)?
a) To enhance user interface
b) To manage user identities and control access to resources
c) To increase data storage capacity
d) To improve network speed
Week 5
Arti cial Intelligence (AI) and Machine Learning (ML) Security
274. What is the primary concern regarding the security of AI systems?
A) AI systems becoming too intelligent
B) Unauthorized access and manipulation of AI models and data
C) AI systems replacing human jobs
D) High power consumption
281. Which of the following helps protect machine learning models from adversarial
attacks?
A) Using simple algorithms
B) Implementing robust model training techniques
C) Allowing unrestricted access to models
D) Ignoring potential security threats
282. What is the impact of a model inversion attack on a machine learning system?
A) Slower model training
B) Extraction of sensitive information from the model
C) Increased model accuracy
D) Reduced data set size
283. Which technique can be used to detect anomalies in machine learning systems?
A) Over tting
B) Anomaly detection algorithms
C) Data compression
D) Reducing training times
Hardware Security
293. What does the term "private key" refer to in blockchain security?
A) A public identi er for blockchain participants
B) A secret key used to sign transactions and access blockchain assets
C) A type of blockchain consensus algorithm
D) A method to encrypt blockchain data
Biometric Security
302. Which biometric method involves analyzing the unique patterns of a person’s
retina?
A) Fingerprint scanning
B) Voice recognition
C) Retinal scanning
D) Facial recognition
303. What is a potential privacy concern with the use of biometric security?
A) High cost of biometric devices
B) Possibility of biometric data being stolen or misused
C) Inability to authenticate users
D) Reduced accuracy compared to passwords
Introduction to Asset Management, Asset Discovery, Con guration
Management
Asset Discovery
314. What is the role of an asset discovery tool in con guration management?
A) To reduce con guration changes
B) To automate the identi cation and documentation of asset con gurations
C) To limit network access
D) To perform software updates
316. Which of the following best describes a con guration item (CI)?
A) A software bug
B) Any component that needs to be managed to deliver an IT service
C) An of ce policy
D) An employee’s performance review
317. What is a con guration management database (CMDB)?
A) A nancial ledger
B) A repository that stores information about con guration items
C) A document management system
D) A hardware inventory list
318. Which process ensures that changes to con gurations are systematically
planned and implemented?
A) Incident management
B) Change management
C) Problem management
D) Financial management
319. What is the bene t of using automated con guration management tools?
A) Increased manual work
B) Enhanced accuracy and ef ciency in managing con gurations
C) Reduced network performance
D) Higher software costs
324. Who is typically responsible for asset classi cation and categorization in an
organization?
A) Human resources department
B) IT department
C) Marketing department
D) Legal department
Patch Management
332. Which phase of the asset life cycle involves securely wiping data and removing
asset identi ers?
A) Acquisition
B) Operation
C) Retirement and decommissioning
D) Deployment
Physical Security
351.Which access control model uses prede ned rules based on roles?
A) Mandatory Access Control (MAC)
B) Role-Based Access Control (RBAC)
C) Discretionary Access Control (DAC)
D) Access Control Lists (ACL)
353. Which access control model uses labels and security clearances to determine
access?
A) Discretionary Access Control (DAC)
B) Mandatory Access Control (MAC)
C) Role-Based Access Control (RBAC)
D) Access Control Lists (ACL)
354. Which access control model allows data owners to determine access
permissions?
A) Mandatory Access Control (MAC)
B) Discretionary Access Control (DAC)
C) Role-Based Access Control (RBAC)
D) Access Control Lists (ACL)
Identity Federation
358. What role does Identity Provider (IdP) play in identity federation?
A) It manages user identities and attributes
B) It encrypts all user data
C) It blocks access to unauthorized users
D) It manages physical assets
359. Which scenario is suitable for implementing identity federation?
A) Managing only internal user accounts
B) Allowing users to use different passwords for each application
C) Providing seamless access to multiple cloud services
D) Restricting access to a single system
360. What role does Service Provider (SP) play in identity federation?
A) It issues identity tokens
B) It manages user credentials
C) It consumes identity information from Identity Provider (IdP)
D) It encrypts all user data