A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?
A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?A . IntegrityB . ConfidentialityC . AvailabilityD . AuthenticationView AnswerAnswer: C Explanation: DDoS attacks overload systems, making services unavailable to legitimate users, directly impacting availability.
What is a potential impact of a successful social engineering attack?
What is a potential impact of a successful social engineering attack?A . Unauthorized data accessB . Network hardware failureC . System performance optimizationD . Improved compliance policiesView AnswerAnswer: A Explanation: Social engineering attacks trick individuals into revealing sensitive information, leading to unauthorized data access and breaches.
Which of the following are potential losses due to security attacks? (Choose two)
Which of the following are potential losses due to security attacks? (Choose two)A . Financial lossB . Reduced system performanceC . Increased regulatory oversightD . Damage to reputationView AnswerAnswer: A, D Explanation: Financial loss and damage to reputation are common outcomes of security breaches, affecting organizations severely.
Which of the following are potential impacts of a phishing attack? (Choose two)
Which of the following are potential impacts of a phishing attack? (Choose two)A . Unauthorized data accessB . System hardware damageC . Credential theftD . Improved network speedView AnswerAnswer: A, C Explanation: Phishing attacks can lead to unauthorized access by tricking users into sharing credentials or sensitive data.
Which element of security prevents unauthorized data modification?
Which element of security prevents unauthorized data modification?A . AvailabilityB . ConfidentialityC . IntegrityD . ScalabilityView AnswerAnswer: C Explanation: Integrity ensures that data remains unchanged and accurate, preventing unauthorized alterations or corruption.
Which two measures help maintain the availability of data during an attack?
Which two measures help maintain the availability of data during an attack?A . Data redundancy and failover systemsB . Strong passwords and encryptionC . Multi-factor authentication and hashingD . Firewalls and intrusion detection systemsView AnswerAnswer: A Explanation: Redundancy and failover systems ensure continuous access to data even during system failures...
Which of the following defines data security?
Which of the following defines data security?A . A method of ensuring physical protection of data.B . Measures to safeguard data from unauthorized access or corruption.C . Techniques for data duplication and storage.D . Ensuring all systems are interconnected.View AnswerAnswer: B Explanation: Data security involves protecting data from unauthorized access,...
Which component is essential for mitigating phishing attacks?
Which component is essential for mitigating phishing attacks?A . Spam filtersB . Advanced encryption methodsC . Physical security measuresD . Hardware-based firewallsView AnswerAnswer: A Explanation: Spam filters reduce the likelihood of phishing emails reaching users, thereby lowering the risk of compromise.
Which of the following can result in data availability loss?
Which of the following can result in data availability loss?A . Unauthorized data encryption by attackersB . Accidental deletion of critical filesC . Prolonged hardware failureD . All of the aboveView AnswerAnswer: D Explanation: Data availability can be compromised by encryption attacks (e.g., ransomware), accidental deletions, or extended hardware failures.
What is the most effective way to mitigate risks associated with unpatched vulnerabilities?
What is the most effective way to mitigate risks associated with unpatched vulnerabilities?A . Encrypting sensitive data.B . Implementing a regular patch management process.C . Conducting monthly data audits.D . Limiting network bandwidth.View AnswerAnswer: B Explanation: Regularly applying patches addresses known vulnerabilities, reducing the risk of exploitation by attackers.