Which two factors improve antivirus software efficiency?
Which two factors improve antivirus software efficiency?A . Frequent updates and real-time protectionB . Increased CPU performance and reduced scansC . Uninstalling unused software and firewallsD . Disabling non-essential system processesView AnswerAnswer: A Explanation: Regular updates and real-time protection keep antivirus software prepared for current threats and ensure constant monitoring.
What does the CIA triad aim to achieve?
What does the CIA triad aim to achieve?A . Regulatory complianceB . Comprehensive data securityC . Data processing efficiencyD . Encryption protocolsView AnswerAnswer: B Explanation: The CIA triad―confidentiality, integrity, and availability―forms the foundation of a comprehensive approach to protecting information assets.
What is the primary purpose of access control?
What is the primary purpose of access control?A . Securing physical server locationsB . Ensuring users can view all organizational dataC . Limiting data access based on roles or permissionsD . Backing up sensitive informationView AnswerAnswer: C Explanation: Access control mechanisms limit access to data and resources, ensuring users only...
What is the best way to minimize insider threats?
What is the best way to minimize insider threats?A . Monitor network traffic continuouslyB . Restrict employee access to only necessary dataC . Implement network segmentationD . Encrypt all communicationsView AnswerAnswer: B Explanation: Limiting data access to only what employees need for their roles reduces the potential for insider threats.
Data breaches primarily threaten which aspect of the CIA triad?
Data breaches primarily threaten which aspect of the CIA triad?A . IntegrityB . ConfidentialityC . AvailabilityD . All of the aboveView AnswerAnswer: B Explanation: Data breaches most directly threaten confidentiality by exposing sensitive information to unauthorized parties.
Which are potential impacts of a loss of confidentiality? (Choose two)
Which are potential impacts of a loss of confidentiality? (Choose two)A . Identity theftB . Data corruptionC . Financial lossesD . Service unavailabilityView AnswerAnswer: A, C Explanation: A confidentiality breach can lead to identity theft and financial losses, affecting individuals and organizations significantly.
Which two steps should be taken to ensure antivirus effectiveness?
Which two steps should be taken to ensure antivirus effectiveness?A . Schedule regular scans and keep software updated.B . Disable real-time protection and use manual scans.C . Remove software firewalls and enable default settings.D . Install multiple antivirus programs for redundancy.View AnswerAnswer: A Explanation: Regular scans and updates keep antivirus...
Which of the following is a primary objective of data classification?
Which of the following is a primary objective of data classification?A . Enhance system performanceB . Reduce storage requirementsC . Prioritize security measures based on data sensitivityD . Enable universal data sharing across departmentsView AnswerAnswer: C Explanation: Data classification organizes information by sensitivity, helping to apply appropriate security controls and...
Which type of attack often leads to identity theft?
Which type of attack often leads to identity theft?A . PhishingB . Man-in-the-middleC . Denial-of-serviceD . MalwareView AnswerAnswer: A Explanation: Phishing attacks trick users into revealing sensitive information, such as personal or financial data, leading to identity theft.
What is the primary goal of confidentiality in the CIA triad?
What is the primary goal of confidentiality in the CIA triad?A . To restrict unauthorized access to sensitive data.B . To ensure all data is backed up.C . To protect systems from malware.D . To provide 24/7 access to systems.View AnswerAnswer: A Explanation: Confidentiality ensures only authorized individuals can access...