What is the role of intrusion detection systems (IDS) in security?
What is the role of intrusion detection systems (IDS) in security?A . Prevent unauthorized access.B . Detect and alert administrators of potential breaches.C . Encrypt sensitive communications.D . Enhance physical security measures.View AnswerAnswer: B Explanation: IDS monitors network traffic and system activity to identify and alert administrators of potential security...
Which of the following is a characteristic of worms?
Which of the following is a characteristic of worms?A . Requires user intervention to spread.B . Replicates itself to spread across networks.C . Disguises itself as legitimate software.D . Steals personal information via phishing.View AnswerAnswer: B Explanation: Worms are self-replicating malware that spreads across networks without requiring user action, exploiting...
Which security measure protects data in transit?
Which security measure protects data in transit?A . FirewallsB . Encryption protocolsC . Multi-factor authenticationD . Data backupsView AnswerAnswer: B Explanation: Encryption protocols safeguard data during transmission, preventing unauthorized access and maintaining confidentiality.
Which of the following are considered potential losses due to security attacks? (Choose two)
Which of the following are considered potential losses due to security attacks? (Choose two)A . Financial lossesB . Improved system performanceC . Loss of customer trustD . Reduction in data redundancyView AnswerAnswer: A, C Explanation: Security attacks can lead to financial losses and damage customer trust, affecting organizational reputation and...
Which type of malware records user activities without their consent?
Which type of malware records user activities without their consent?A . TrojansB . AdwareC . SpywareD . WormsView AnswerAnswer: C Explanation: Spyware collects and transmits user data, such as keystrokes and browsing activities, without the user’s knowledge.
Which type of data is typically most at risk during transit?
Which type of data is typically most at risk during transit?A . Encrypted dataB . Redundant backup filesC . Unencrypted sensitive dataD . Archived filesView AnswerAnswer: C Explanation: Unencrypted data in transit is vulnerable to interception, potentially compromising confidentiality and security.
What should be done after installing antivirus software?
What should be done after installing antivirus software?A . Disconnect the system from the internet.B . Update the software and run a full system scan.C . Disable real-time scanning to improve performance.D . Perform a factory reset on the system.View AnswerAnswer: B Explanation: Updating antivirus software ensures it recognizes the...
Which type of malware encrypts files and demands payment for access?
Which type of malware encrypts files and demands payment for access?A . SpywareB . RansomwareC . WormsD . AdwareView AnswerAnswer: B Explanation: Ransomware encrypts files, restricting access to them until a ransom is paid, targeting availability and causing significant disruptions.
Which are common potential losses from a data breach? (Choose two)
Which are common potential losses from a data breach? (Choose two)A . Financial penaltiesB . Enhanced system performanceC . Loss of customer trustD . Increased data redundancyView AnswerAnswer: A, C Explanation: Data breaches often lead to regulatory fines and loss of trust, severely impacting financial and reputational aspects.
A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?
A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?A . IntegrityB . ConfidentialityC . AvailabilityD . AuthenticationView AnswerAnswer: C Explanation: DDoS attacks overload systems, making services unavailable to legitimate users, directly impacting availability.