1. What is a key aspect of strategic infrastructure security?
Building resilient and secure infrastructure
Focusing only on software security
Eliminating network security risks
Focusing only on hardware security
Show Answer
✅ Correct Answer: Building resilient and secure infrastructure
2. What is the purpose of a Security Policy?
Define rules for information security
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Define rules for information security
3. What is the purpose of a Risk Assessment?
Identify and evaluate security risks
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Identify and evaluate security risks
4. Which technique is used to assess security vulnerabilities?
Vulnerability Assessment
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Vulnerability Assessment
5. What is the purpose of a Security Incident Response Plan?
Manage and mitigate security incidents
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Manage and mitigate security incidents
6. Which technique is used to prioritize security risks?
Risk Prioritization Matrix
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Risk Prioritization Matrix
7. What is the purpose of a Security Awareness Program?
Educate employees about security risks
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Educate employees about security risks
8. Which technique is used to assess security controls?
Security Control Assessment
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Security Control Assessment
9. What is the purpose of a Security Audit?
Evaluate compliance with security policies
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Evaluate compliance with security policies
10. Which technique is used to assess security risks?
Risk Assessment
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Risk Assessment
11. What is the purpose of a Security Governance Framework?
Define decision-making processes for security management
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Define decision-making processes for security management
12. Which technique is used to align security objectives with strategic objectives?
Strategic Alignment
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Strategic Alignment
13. What is the purpose of a Security Dashboard?
Provide a visual summary of security performance
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Provide a visual summary of security performance
14. Which technique is used to evaluate security performance?
Key Performance Indicators (KPIs)
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Key Performance Indicators (KPIs)
15. What is the purpose of a Security Risk Management Plan?
Define how security risks will be managed
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Define how security risks will be managed
16. Which technique is used to prioritize security investments?
Investment Prioritization
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Investment Prioritization
17. What is the purpose of a Security Communication Plan?
Define how security information will be shared
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Define how security information will be shared
18. Which technique is used to assess security value?
Value Assessment
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Value Assessment
19. What is the purpose of a Security Review?
Evaluate the performance of security components
Track project costs
Assign project resources
Define project scope
Show Answer
✅ Correct Answer: Evaluate the performance of security components
20. Which technique is used to manage security resources?
Resource Allocation
Gantt Chart
Stakeholder Analysis
Risk Register
Show Answer
✅ Correct Answer: Resource Allocation
21. What is the purpose of a Security Architecture Framework?
Define secure design principles
Track project costs
Replace firewalls
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Define secure design principles
22. Which security model emphasizes least privilege access?
Zero Trust
Defense in Depth
Perimeter Security
Honeypot
Show Answer
✅ Correct Answer: Zero Trust
23. What is the purpose of a Security Operations Center (SOC)?
Monitor and respond to security incidents
Develop software applications
Manage financial budgets
Coordinate stakeholder meetings
Show Answer
✅ Correct Answer: Monitor and respond to security incidents
24. Which framework is commonly used for security governance?
ISO 27001
ITIL
PRINCE2
COBIT
Show Answer
✅ Correct Answer: ISO 27001
25. What is the purpose of a Business Impact Analysis (BIA)?
Identify critical business functions and their recovery needs
Track network performance
Replace risk assessments
Manage software development
Show Answer
✅ Correct Answer: Identify critical business functions and their recovery needs
26. Which technique is used to simulate cyberattacks?
Penetration Testing
Vulnerability Scanning
Risk Assessment
Stakeholder Analysis
Show Answer
✅ Correct Answer: Penetration Testing
27. What is the purpose of a Disaster Recovery Plan (DRP)?
Restore IT systems after a disruption
Prevent all cyberattacks
Replace security policies
Manage employee training
Show Answer
✅ Correct Answer: Restore IT systems after a disruption
28. Which security control protects against data breaches?
Data Encryption
Load Balancing
Network Segmentation
Patch Management
Show Answer
✅ Correct Answer: Data Encryption
29. What is the purpose of a Security Baseline?
Define minimum security standards
Track financial budgets
Replace risk assessments
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Define minimum security standards
30. Which framework focuses on cloud security?
CSA STAR
NIST CSF
ISO 27001
PCI DSS
Show Answer
✅ Correct Answer: CSA STAR
31. What is the purpose of a Threat Intelligence Feed?
Provide information about emerging threats
Track employee performance
Replace firewalls
Manage software licenses
Show Answer
✅ Correct Answer: Provide information about emerging threats
32. Which technique ensures systems are up-to-date?
Patch Management
Vulnerability Scanning
Penetration Testing
Risk Assessment
Show Answer
✅ Correct Answer: Patch Management
33. What is the purpose of a Security Maturity Assessment?
Evaluate the effectiveness of security controls
Track project costs
Replace security policies
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Evaluate the effectiveness of security controls
34. Which standard focuses on payment card security?
PCI DSS
ISO 27001
NIST CSF
COBIT
Show Answer
✅ Correct Answer: PCI DSS
35. What is the purpose of a Security Awareness Training Program?
Educate employees about security best practices
Track network performance
Replace security controls
Manage financial budgets
Show Answer
✅ Correct Answer: Educate employees about security best practices
36. Which technique identifies system weaknesses?
Vulnerability Scanning
Penetration Testing
Risk Assessment
Stakeholder Analysis
Show Answer
✅ Correct Answer: Vulnerability Scanning
37. What is the purpose of a Business Continuity Plan (BCP)?
Ensure critical operations continue during disruptions
Prevent all cyberattacks
Replace security policies
Manage software development
Show Answer
✅ Correct Answer: Ensure critical operations continue during disruptions
38. Which security control prevents unauthorized access?
Multi-Factor Authentication (MFA)
Data Encryption
Load Balancing
Patch Management
Show Answer
✅ Correct Answer: Multi-Factor Authentication (MFA)
39. What is the purpose of a Security Compliance Audit?
Verify adherence to security standards
Track employee performance
Replace security controls
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Verify adherence to security standards
40. Which framework provides a risk management approach?
NIST CSF
ISO 27001
PCI DSS
COBIT
Show Answer
✅ Correct Answer: NIST CSF
41. What is the purpose of a Security Information and Event Management (SIEM) system?
Centralize and analyze security events
Track financial budgets
Replace firewalls
Manage software development
Show Answer
✅ Correct Answer: Centralize and analyze security events
42. Which technique protects against phishing attacks?
Email Filtering
Vulnerability Scanning
Penetration Testing
Risk Assessment
Show Answer
✅ Correct Answer: Email Filtering
43. What is the purpose of a Security Governance Framework?
Define security decision-making processes
Track network performance
Replace security controls
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Define security decision-making processes
44. Which standard focuses on industrial control systems?
IEC 62443
ISO 27001
NIST CSF
PCI DSS
Show Answer
✅ Correct Answer: IEC 62443
45. What is the purpose of a Security Risk Register?
Document and track security risks
Track employee performance
Replace security policies
Manage financial budgets
Show Answer
✅ Correct Answer: Document and track security risks
46. Which technique ensures data integrity?
Hash Functions
Vulnerability Scanning
Penetration Testing
Risk Assessment
Show Answer
✅ Correct Answer: Hash Functions
47. What is the purpose of a Security Policy Framework?
Define organizational security policies
Track project costs
Replace security controls
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Define organizational security policies
48. Which framework focuses on IT governance?
COBIT
ISO 27001
NIST CSF
PCI DSS
Show Answer
✅ Correct Answer: COBIT
49. What is the purpose of a Security Training Needs Assessment?
Identify gaps in security knowledge
Track network performance
Replace security controls
Manage financial budgets
Show Answer
✅ Correct Answer: Identify gaps in security knowledge
50. Which technique protects against DDoS attacks?
Traffic Filtering
Vulnerability Scanning
Penetration Testing
Risk Assessment
Show Answer
✅ Correct Answer: Traffic Filtering
51. What is the purpose of a Security Compliance Framework?
Ensure adherence to regulations
Track employee performance
Replace security policies
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Ensure adherence to regulations
52. Which standard focuses on healthcare information security?
HIPAA
ISO 27001
NIST CSF
PCI DSS
Show Answer
✅ Correct Answer: HIPAA
53. What is the purpose of a Security Awareness Campaign?
Promote security best practices
Track financial budgets
Replace security controls
Manage software development
Show Answer
✅ Correct Answer: Promote security best practices
54. Which technique ensures secure remote access?
VPN
Vulnerability Scanning
Penetration Testing
Risk Assessment
Show Answer
✅ Correct Answer: VPN
55. What is the purpose of a Security Metrics Program?
Measure the effectiveness of security controls
Track network performance
Replace security policies
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Measure the effectiveness of security controls
56. Which framework focuses on privacy protection?
GDPR
ISO 27001
NIST CSF
PCI DSS
Show Answer
✅ Correct Answer: GDPR
57. What is the purpose of a Security Incident Report?
Document details of a security breach
Track employee performance
Replace security controls
Manage financial budgets
Show Answer
✅ Correct Answer: Document details of a security breach
58. Which technique protects against malware?
Antivirus Software
Vulnerability Scanning
Penetration Testing
Risk Assessment
Show Answer
✅ Correct Answer: Antivirus Software
59. What is the purpose of a Security Benchmarking Assessment?
Compare security practices with industry standards
Track project costs
Replace security policies
Manage stakeholder engagement
Show Answer
✅ Correct Answer: Compare security practices with industry standards
60. Which standard focuses on financial information security?
GLBA
ISO 27001
NIST CSF
PCI DSS
Show Answer
✅ Correct Answer: GLBA