What type of loss does this represent?

An employee accidentally deletes critical files. What type of loss does this represent?A . Loss of confidentialityB . Loss of availabilityC . Loss of integrityD . Regulatory non-complianceView AnswerAnswer: C Explanation: When files are altered or deleted without intent, it constitutes a loss of data integrity, affecting its reliability.

April 1, 2025 No Comments READ MORE +

Which is NOT a core element of security?

Which is NOT a core element of security?A . ConfidentialityB . Data auditingC . IntegrityD . AvailabilityView AnswerAnswer: B Explanation: Core elements of security include confidentiality, integrity, and availability (CIA triad). Auditing supports security but is not a core element.

April 1, 2025 No Comments READ MORE +

Which type of security loss occurs due to a ransomware attack?

Which type of security loss occurs due to a ransomware attack?A . Loss of availabilityB . Loss of confidentialityC . Loss of integrityD . Regulatory penaltiesView AnswerAnswer: A Explanation: Ransomware attacks primarily affect availability by restricting access to systems and data until a ransom is paid.

March 31, 2025 No Comments READ MORE +

What is the primary advantage of implementing access controls?

What is the primary advantage of implementing access controls?A . To speed up system processes.B . To restrict unauthorized access to sensitive information.C . To simplify data encryption.D . To reduce the need for system audits.View AnswerAnswer: B Explanation: Access controls ensure only authorized individuals can access sensitive information, maintaining...

March 29, 2025 No Comments READ MORE +

What is the purpose of real-time scanning in antivirus software?

What is the purpose of real-time scanning in antivirus software?A . To scan the system only during idle times.B . To monitor and detect threats as they occur.C . To analyze encrypted files for malware.D . To speed up the system’s processing time.View AnswerAnswer: B Explanation: Real-time scanning continuously monitors...

March 29, 2025 No Comments READ MORE +

What is the first step in establishing a secure computing environment?

What is the first step in establishing a secure computing environment?A . Regular software updatesB . Identifying and classifying assetsC . Encrypting all dataD . Installing a firewallView AnswerAnswer: B Explanation: Identifying and classifying assets helps organizations understand what needs protection and prioritize security measures effectively.

March 28, 2025 No Comments READ MORE +

Which of the following best describes a zero-day vulnerability?

Which of the following best describes a zero-day vulnerability?A . A known security flaw with no existing patchesB . A flaw exploited after a patch is releasedC . An outdated security protocolD . A misconfigured firewall settingView AnswerAnswer: A Explanation: A zero-day vulnerability refers to a security flaw discovered by...

March 26, 2025 No Comments READ MORE +

Which attack is an example of compromising availability?

Which attack is an example of compromising availability?A . PhishingB . Denial-of-serviceC . Malware installationD . Credential theftView AnswerAnswer: B Explanation: Denial-of-service attacks compromise availability by overwhelming a system, making it inaccessible to authorized users.

March 24, 2025 No Comments READ MORE +

What is the best method to remove stubborn malware from a system?

What is the best method to remove stubborn malware from a system?A . Reinstalling the operating system.B . Running an antivirus scan in safe mode.C . Disabling internet connectivity.D . Restarting the system in normal mode.View AnswerAnswer: B Explanation: Running antivirus software in safe mode helps remove malware by preventing...

March 23, 2025 No Comments READ MORE +

Which type of malware is designed to track keyboard input?

Which type of malware is designed to track keyboard input?A . RansomwareB . KeyloggerC . WormD . Trojan horseView AnswerAnswer: B Explanation: Keyloggers record keystrokes to capture sensitive information, such as passwords and financial details.

March 21, 2025 No Comments READ MORE +