100 Data Security MCQ (PDF) with Answers
1. What does the term “data security” encompass?
a) Protection of physical assets
b) Safeguarding digital assets and information
c) Preventing natural disasters
d) Ensuring software compatibility
Answer: b) Safeguarding digital assets and information
2. Which of the following is a primary goal of data security?
a) Sharing data openly with all users
b) Maximizing data collection
c) Unauthorized data access prevention
d) Reducing data storage costs
Answer: c) Unauthorized data access prevention
3. What is the term for the process of converting data into a code to prevent unauthorized access?
a) Encryption
b) Compression
c) Archiving
d) Encoding
Answer: a) Encryption
4. What does the CIA triad stand for in data security?
a) Centralized Information Access
b) Cybersecurity Intelligence and Analysis
c) Confidentiality, Integrity, Availability
d) Continuous Improvement Approach
Answer: c) Confidentiality, Integrity, Availability
5. Which security measure verifies the identity of a user or system before granting access?
a) Firewall
b) Encryption
c) Authentication
d) Intrusion Detection System (IDS)
Answer: c) Authentication
6. A virus that disguises itself as a legitimate program but carries out malicious actions is called:
a) Worm
b) Trojan horse
c) Phishing email
d) Spyware
Answer: b) Trojan horse
7. Which type of attack involves an attacker intercepting and altering communication between two parties?
a) Man-in-the-middle
b) Denial of Service (DoS)
c) Ransomware
d) Spoofing
Answer: a) Man-in-the-middle
8. The process of transforming data into a scrambled format that is only readable with a decryption key is known as:
a) Hacking
b) Phishing
c) Encryption
d) Spoofing
Answer: c) Encryption
9. Which data protection law aims to provide individuals control over their personal data and its use?
a) HIPAA
b) GDPR
c) SOX
d) FISMA
Answer: b) GDPR
10. What is the primary purpose of a firewall in data security?
a) Encrypt data during transmission
b) Prevent unauthorized access to a network
c) Archive data for long-term storage
d) Detect phishing emails
Answer: b) Prevent unauthorized access to a network