Q1 : A company wants to ensure users only have access to the resources necessary for their job roles.
What principle is being applied?
A. Defense in depth
B. Least privilege
C. Separation of duties
D. Zero trust
Answer: B
Q2 : Which control type is a firewall considered?
A. Administrative
B. Physical
C. Technical
D. Detective
Answer: C
Q3 : An employee clicks a malicious link that installs malware. What type of attack is this?
A. Phishing
B. Social engineering
C. Malware injection
D. Insider threat
Answer: A
Q4 : What is the FIRST step in incident response?
A. Containment
B. Identification
C. Eradication
D. Recovery
Answer: B
Q5 : Which of the following BEST ensures data can be recovered after a disaster?
A. Encryption
B. Backups
C. Access control
D. Monitoring
Answer: B