Which of the following best describes a man-in-the-middle attack?
Which of the following best describes a man-in-the-middle attack?A . Exploiting software vulnerabilities to gain access.B . Intercepting and altering communications between two parties.C . Overloading systems with traffic to deny service.D . Distributing malware to gain system control.View AnswerAnswer: B Explanation: A man-in-the-middle attack intercepts and manipulates communications between...
What type of loss does this represent?
An employee accidentally deletes critical files. What type of loss does this represent?A . Loss of confidentialityB . Loss of availabilityC . Loss of integrityD . Regulatory non-complianceView AnswerAnswer: C Explanation: When files are altered or deleted without intent, it constitutes a loss of data integrity, affecting its reliability.
Which is NOT a core element of security?
Which is NOT a core element of security?A . ConfidentialityB . Data auditingC . IntegrityD . AvailabilityView AnswerAnswer: B Explanation: Core elements of security include confidentiality, integrity, and availability (CIA triad). Auditing supports security but is not a core element.
Which type of security loss occurs due to a ransomware attack?
Which type of security loss occurs due to a ransomware attack?A . Loss of availabilityB . Loss of confidentialityC . Loss of integrityD . Regulatory penaltiesView AnswerAnswer: A Explanation: Ransomware attacks primarily affect availability by restricting access to systems and data until a ransom is paid.
What is the primary advantage of implementing access controls?
What is the primary advantage of implementing access controls?A . To speed up system processes.B . To restrict unauthorized access to sensitive information.C . To simplify data encryption.D . To reduce the need for system audits.View AnswerAnswer: B Explanation: Access controls ensure only authorized individuals can access sensitive information, maintaining...
What is the purpose of real-time scanning in antivirus software?
What is the purpose of real-time scanning in antivirus software?A . To scan the system only during idle times.B . To monitor and detect threats as they occur.C . To analyze encrypted files for malware.D . To speed up the system’s processing time.View AnswerAnswer: B Explanation: Real-time scanning continuously monitors...
What is the first step in establishing a secure computing environment?
What is the first step in establishing a secure computing environment?A . Regular software updatesB . Identifying and classifying assetsC . Encrypting all dataD . Installing a firewallView AnswerAnswer: B Explanation: Identifying and classifying assets helps organizations understand what needs protection and prioritize security measures effectively.
Which of the following best describes a zero-day vulnerability?
Which of the following best describes a zero-day vulnerability?A . A known security flaw with no existing patchesB . A flaw exploited after a patch is releasedC . An outdated security protocolD . A misconfigured firewall settingView AnswerAnswer: A Explanation: A zero-day vulnerability refers to a security flaw discovered by...
Which attack is an example of compromising availability?
Which attack is an example of compromising availability?A . PhishingB . Denial-of-serviceC . Malware installationD . Credential theftView AnswerAnswer: B Explanation: Denial-of-service attacks compromise availability by overwhelming a system, making it inaccessible to authorized users.
What is the best method to remove stubborn malware from a system?
What is the best method to remove stubborn malware from a system?A . Reinstalling the operating system.B . Running an antivirus scan in safe mode.C . Disabling internet connectivity.D . Restarting the system in normal mode.View AnswerAnswer: B Explanation: Running antivirus software in safe mode helps remove malware by preventing...