What is the role of intrusion detection systems (IDS) in security?

What is the role of intrusion detection systems (IDS) in security?A . Prevent unauthorized access.B . Detect and alert administrators of potential breaches.C . Encrypt sensitive communications.D . Enhance physical security measures.View AnswerAnswer: B Explanation: IDS monitors network traffic and system activity to identify and alert administrators of potential security...

February 21, 2025 No Comments READ MORE +

Which of the following is a characteristic of worms?

Which of the following is a characteristic of worms?A . Requires user intervention to spread.B . Replicates itself to spread across networks.C . Disguises itself as legitimate software.D . Steals personal information via phishing.View AnswerAnswer: B Explanation: Worms are self-replicating malware that spreads across networks without requiring user action, exploiting...

February 21, 2025 No Comments READ MORE +

Which security measure protects data in transit?

Which security measure protects data in transit?A . FirewallsB . Encryption protocolsC . Multi-factor authenticationD . Data backupsView AnswerAnswer: B Explanation: Encryption protocols safeguard data during transmission, preventing unauthorized access and maintaining confidentiality.

February 19, 2025 No Comments READ MORE +

Which of the following are considered potential losses due to security attacks? (Choose two)

Which of the following are considered potential losses due to security attacks? (Choose two)A . Financial lossesB . Improved system performanceC . Loss of customer trustD . Reduction in data redundancyView AnswerAnswer: A, C Explanation: Security attacks can lead to financial losses and damage customer trust, affecting organizational reputation and...

February 18, 2025 No Comments READ MORE +

Which type of malware records user activities without their consent?

Which type of malware records user activities without their consent?A . TrojansB . AdwareC . SpywareD . WormsView AnswerAnswer: C Explanation: Spyware collects and transmits user data, such as keystrokes and browsing activities, without the user’s knowledge.

February 15, 2025 No Comments READ MORE +

Which type of data is typically most at risk during transit?

Which type of data is typically most at risk during transit?A . Encrypted dataB . Redundant backup filesC . Unencrypted sensitive dataD . Archived filesView AnswerAnswer: C Explanation: Unencrypted data in transit is vulnerable to interception, potentially compromising confidentiality and security.

February 14, 2025 No Comments READ MORE +

What should be done after installing antivirus software?

What should be done after installing antivirus software?A . Disconnect the system from the internet.B . Update the software and run a full system scan.C . Disable real-time scanning to improve performance.D . Perform a factory reset on the system.View AnswerAnswer: B Explanation: Updating antivirus software ensures it recognizes the...

February 14, 2025 No Comments READ MORE +

Which type of malware encrypts files and demands payment for access?

Which type of malware encrypts files and demands payment for access?A . SpywareB . RansomwareC . WormsD . AdwareView AnswerAnswer: B Explanation: Ransomware encrypts files, restricting access to them until a ransom is paid, targeting availability and causing significant disruptions.

February 12, 2025 No Comments READ MORE +

Which are common potential losses from a data breach? (Choose two)

Which are common potential losses from a data breach? (Choose two)A . Financial penaltiesB . Enhanced system performanceC . Loss of customer trustD . Increased data redundancyView AnswerAnswer: A, C Explanation: Data breaches often lead to regulatory fines and loss of trust, severely impacting financial and reputational aspects.

February 8, 2025 No Comments READ MORE +

A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?

A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?A . IntegrityB . ConfidentialityC . AvailabilityD . AuthenticationView AnswerAnswer: C Explanation: DDoS attacks overload systems, making services unavailable to legitimate users, directly impacting availability.

February 5, 2025 No Comments READ MORE +