Module 5 MCQ of Cyber Security
Module 5 MCQ of Cyber Security
UNIT-V
1. What is one of the essential practices for securing endpoint devices?
A) Avoiding software updates
B) Disabling firewalls
C) Implementing strong authentication
D) Sharing passwords openly
Answer: C) Implementing strong authentication
11. Why is it important to review and manage app permissions on mobile phones?
A) To limit what data apps can access
B) To encourage app downloads from untrusted sources
C) To simplify the app installation process
D) To increase the risk of data breaches
Answer: A) To limit what data apps can access
12. What is one of the key practices for securing endpoint devices?
A) Sharing passwords openly
B) Disabling firewalls
C) Regularly backing up important data
D) Allowing unrestricted access to accounts
Answer: C) Regularly backing up important data
15. Why is it important to avoid installing apps from untrusted sources on mobile phones?
A) To simplify the app installation process
B) To increase the risk of data breaches
C) To encourage customization of the device
D) To reduce the risk of installing malicious software
Answer: D) To reduce the risk of installing malicious software
18. Where should patches be obtained from during the acquisition phase?
A) Unverified sources
B) Official sources
C) Social media
D) Online forums
Answer: B) Official sources
20. What should be done after deploying patches to the production environment?
A) Stop monitoring
B) Start testing again
C) Verification
D) Acquisition
Answer: C) Verification
25. Which phase involves confirming that patches have been successfully applied?
A) Testing
B) Acquisition
C) Verification
D) Documentation
Answer: C) Verification
29. What is the purpose of testing the restoration process for backups?
A) To automate the backup process
B) To ensure backups are encrypted
C) To verify that backups are usable
D) To increase system performance
Answer: C) To verify that backups are usable
32. What should users check to gauge the reliability of third-party software?
A) The color scheme of the software website
B) The number of advertisements on the website
C) Reviews, ratings, and user feedback
D) The font size used on the software's download page
Answer: C) Reviews, ratings, and user feedback
36. What should users do before downloading third-party software from a website?
A) Verify the authenticity of the website and software
B) Install the software immediately without hesitation
C) Skip reading the license agreement
D) Disable antivirus software
Answer: A) Verify the authenticity of the website and software
37. Why is it important to read the license agreement before installing third-party software?
A) To increase system performance
B) To understand the terms and conditions of using the software
C) To avoid encryption of data backups
D) To simplify the software installation process
Answer: B) To understand the terms and conditions of using the software
39. What should users consider using to test potentially risky software?
A) Virtual environments or sandboxes
B) Sharing software with colleagues
C) Ignoring reviews and ratings
D) Installing it directly on the main system
Answer: A) Virtual environments or sandboxes
41. What is the purpose of establishing device usage guidelines in a device security policy?
A) To restrict all device usage within the organization
B) To specify who can use company devices and for what purposes
C) To encourage unlimited device usage
D) To enforce strict penalties for device misuse
Answer: B) To specify who can use company devices and for what purposes
42. What does an acceptable use policy typically cover in a device security policy?
A) Employee salaries and benefits
B) Browsing certain websites and downloading software
C) Company mission and vision statements
D) Personal hobbies and interests
Answer: B) Browsing certain websites and downloading software
43. What is recommended for password and authentication in a device security policy?
A) Weak, easily guessable passwords
B) Sharing passwords among colleagues
C) Strong, unique passwords for each device and multi-factor authentication
D) Passwords written on sticky notes attached to devices
Answer: C) Strong, unique passwords for each device and multi-factor authentication
45. What is the purpose of regular updates and patching in a device security policy?
A) To keep devices outdated and vulnerable
B) To reduce device performance
C) To protect against vulnerabilities by installing the latest security updates
D) To increase the risk of security breaches
Answer: C) To protect against vulnerabilities by installing the latest security updates
47. What protocols are typically defined for secure remote access in a device security policy?
A) Use of outdated and insecure connections
B) Avoiding virtual private networks (VPNs)
C) Secure remote access using VPNs and other secure connections
D) Sharing login credentials openly
Answer: C) Secure remote access using VPNs and other secure connections
48. Why are procedures for handling lost or stolen devices established in a device security
policy?
A) To encourage device theft
B) To avoid reporting lost or stolen devices
C) To mitigate potential data breaches
D) To increase the risk of unauthorized access
Answer: C) To mitigate potential data breaches
49. What is the purpose of software and application management guidelines in a device
security policy?
A) To install outdated and insecure software
B) To prevent employees from installing any software
C) To specify guidelines for installing, updating, and removing software and applications
D) To encourage employees to install unauthorized software
Answer: C) To specify guidelines for installing, updating, and removing software and applications
53. Which best practice involves using complex passwords and multi-factor authentication?
A) Regular backups
B) Secure Wi-Fi networks
C) Host firewall configuration
D) User authentication
Answer: D) User authentication
56. Which measure involves restricting user access to only necessary data and systems?
A) Regular backups
B) Least privilege
C) Encryption of sensitive data
D) Multi-factor authentication
Answer: B) Least privilege
58. What is the significance of implementing both host firewalls and antivirus software?
A) They increase Wi-Fi network speed
B) They prevent hardware failures
C) They provide complementary protection
D) They eliminate the need for regular backups
Answer: C) They provide complementary protection
66. What is the primary purpose of configuring firewall rules based on the principle of least
privilege?
A) To maximize network speed
B) To block all inbound traffic
C) To allow only necessary traffic
D) To disable firewall logging
Answer: C) To allow only necessary traffic
68. What is the purpose of enabling logging and monitoring in firewall management?
A) To block all outbound traffic
B) To track firewall activities
C) To disable real-time protection
D) To hide the network name (SSID)
Answer: B) To track firewall activities
69. What does a default deny policy aim to achieve in firewall management?
A) To allow all traffic by default
B) To block all inbound traffic
C) To minimize the attack surface
D) To enable real-time scanning
Answer: C) To minimize the attack surface
73. What is the purpose of hiding the network name (SSID) in Wi-Fi security?
A) To increase network speed
B) To prevent unauthorized access
C) To enable MAC address filtering
D) To minimize router firmware updates
Answer: B) To prevent unauthorized access
77. Which principle advocates giving users only the necessary permissions to perform their
tasks?
A) Least Privilege
B) Separation of Duties
C) Role-Based Access Control
D) Access Control Policies
Answer: A) Least Privilege
78. What is the purpose of defining data encryption policies in a security policy?
A) To enforce password guidelines
B) To specify roles and permissions
C) To determine how often systems should be updated
D) To specify when and where encryption should be applied to sensitive data
Answer: D) To specify when and where encryption should be applied to sensitive data
80. Why is it important to periodically review and update security policies and permissions?
A) To educate employees about security policies
B) To align security policies with relevant regulations and standards
C) To implement data encryption policies
D) To conduct a risk assessment
Answer: B) To align security policies with relevant regulations and standards