Skip to main content

AP Cybersecurity MCQ Practice Unit 2

UNIT 2: Securing Spaces

Topic 2.1: Cyber Foundations

A security analyst determines that a specific server vulnerability has a high likelihood of being exploited, with a potential financial impact of over $1 million. The company decides to purchase a specialized insurance policy to cover any losses from such an attack. This risk management strategy is an example of:

An adversary gains access to a company’s internal network and installs malware that allows them to maintain access over a long period, sending commands and receiving data through a hidden channel. This phase of a cyberattack is known as:

A company protects its customer database by using a firewall, data encryption, and strict access control policies. This layered approach, which uses multiple types of controls to protect a single asset, is a direct application of which security strategy?

Which of the following is an example of a technical security control?

A qualitative risk analysis for a vulnerability on a non-critical marketing server might result in which of the following ratings?

An employee who was recently fired uses their still-active credentials to log into the company's network and delete critical files. This type of adversary is best classified as a(n):

A hospital's network goes down due to a cyberattack, preventing doctors from accessing patient records. This is a failure of which core security principle?

An attacker gains access to a low-privilege user account on a network. The attacker then uses various techniques to gain control of an administrator's account. This activity is best described as:

Topic 2.2: Physical Vulnerabilities and Attacks

An adversary walks closely behind an authorized employee through a badge-protected door without the employee's knowledge. This physical security breach is known as:

A security consultant is assessing a company's office. They find sensitive documents, including network diagrams and password lists, in a public recycling bin behind the building. This demonstrates a vulnerability to which type of physical attack?

A company's main server room has an unlocked door and is located in a hallway with heavy foot traffic. A risk assessment of this situation would most likely rate the risk to the servers as:

An adversary gains physical access to a company laptop and plugs in a USB device that automatically installs malware. Which of the following vulnerabilities was most directly exploited?

Which of the following scenarios poses the highest risk from physical vulnerabilities?

An adversary creates a perfect copy of an employee's RFID access badge without their knowledge. This allows the adversary to unlock secure doors as if they were the employee. This attack is known as:

A natural disaster, such as a flood, that damages a company's server room is an example of:

An attacker looks over a person's shoulder as they type their password into a computer at a public kiosk. This attack is called:

Topic 2.3: Protecting Physical Spaces

A company policy requires all employees to lock their computers when they leave their desks and to clear sensitive documents from their workspace at the end of the day. This is an example of which type of security control?

To prevent unauthorized individuals from following employees into a highly secure area, a company installs an access control vestibule (a small room with two doors, where only one door can be open at a time). This is a direct mitigation for which types of attacks?

An organization's data center is located in an area prone to power outages. To ensure that servers remain operational during a short-term outage, which of the following physical controls should be implemented?

A company's workstation security policy mandates the use of privacy screen filters on all laptops used in open-plan offices or public spaces. This control is designed to mitigate the risk of:

Which of the following represents the strongest implementation of layered physical security for a server room?

When prioritizing which physical security risks to mitigate first, a security manager should primarily consider:

A card reader system that logs all entries into a restricted area provides which two functions?

A company wants to prevent employees from leaving sensitive paper documents on their desks overnight. Which of the following controls would be most effective?

Topic 2.4: Detecting Physical Attacks

A motion sensor in a server room sends an alert to the security team at 3:00 AM. To be most effective, what other detective control should be paired with the motion sensor?

After a theft, investigators review security camera recordings to identify the perpetrator and determine how they gained access to the building. In this context, the camera footage serves as:

Why are motion sensors generally not recommended for high-traffic areas like a main lobby during business hours?

A log from a door access control system shows that a door to a secure lab was held open for 60 seconds after an authorized badge was used, which is much longer than the typical 5-second entry time. This data could indicate which type of physical attack?

The primary function of a detective physical security control is to:

How can trained employees act as a detective control?

A security system uses facial recognition software linked to cameras at a building's entrance. The system is designed to alert security if an individual on a 'watch list' enters the premises. This is an example of:

A patrolling guard is often a more effective deterrent than a stationary guard against an adversary trying to breach a building's perimeter because: