Which two factors improve antivirus software efficiency?

Which two factors improve antivirus software efficiency?A . Frequent updates and real-time protectionB . Increased CPU performance and reduced scansC . Uninstalling unused software and firewallsD . Disabling non-essential system processesView AnswerAnswer: A Explanation: Regular updates and real-time protection keep antivirus software prepared for current threats and ensure constant monitoring.

March 14, 2025 No Comments READ MORE +

What does the CIA triad aim to achieve?

What does the CIA triad aim to achieve?A . Regulatory complianceB . Comprehensive data securityC . Data processing efficiencyD . Encryption protocolsView AnswerAnswer: B Explanation: The CIA triad―confidentiality, integrity, and availability―forms the foundation of a comprehensive approach to protecting information assets.

March 14, 2025 No Comments READ MORE +

What is the primary purpose of access control?

What is the primary purpose of access control?A . Securing physical server locationsB . Ensuring users can view all organizational dataC . Limiting data access based on roles or permissionsD . Backing up sensitive informationView AnswerAnswer: C Explanation: Access control mechanisms limit access to data and resources, ensuring users only...

March 12, 2025 No Comments READ MORE +

What is the best way to minimize insider threats?

What is the best way to minimize insider threats?A . Monitor network traffic continuouslyB . Restrict employee access to only necessary dataC . Implement network segmentationD . Encrypt all communicationsView AnswerAnswer: B Explanation: Limiting data access to only what employees need for their roles reduces the potential for insider threats.

March 12, 2025 No Comments READ MORE +

Data breaches primarily threaten which aspect of the CIA triad?

Data breaches primarily threaten which aspect of the CIA triad?A . IntegrityB . ConfidentialityC . AvailabilityD . All of the aboveView AnswerAnswer: B Explanation: Data breaches most directly threaten confidentiality by exposing sensitive information to unauthorized parties.

March 12, 2025 No Comments READ MORE +

Which are potential impacts of a loss of confidentiality? (Choose two)

Which are potential impacts of a loss of confidentiality? (Choose two)A . Identity theftB . Data corruptionC . Financial lossesD . Service unavailabilityView AnswerAnswer: A, C Explanation: A confidentiality breach can lead to identity theft and financial losses, affecting individuals and organizations significantly.

March 11, 2025 No Comments READ MORE +

Which two steps should be taken to ensure antivirus effectiveness?

Which two steps should be taken to ensure antivirus effectiveness?A . Schedule regular scans and keep software updated.B . Disable real-time protection and use manual scans.C . Remove software firewalls and enable default settings.D . Install multiple antivirus programs for redundancy.View AnswerAnswer: A Explanation: Regular scans and updates keep antivirus...

March 8, 2025 No Comments READ MORE +

Which of the following is a primary objective of data classification?

Which of the following is a primary objective of data classification?A . Enhance system performanceB . Reduce storage requirementsC . Prioritize security measures based on data sensitivityD . Enable universal data sharing across departmentsView AnswerAnswer: C Explanation: Data classification organizes information by sensitivity, helping to apply appropriate security controls and...

March 8, 2025 No Comments READ MORE +

Which type of attack often leads to identity theft?

Which type of attack often leads to identity theft?A . PhishingB . Man-in-the-middleC . Denial-of-serviceD . MalwareView AnswerAnswer: A Explanation: Phishing attacks trick users into revealing sensitive information, such as personal or financial data, leading to identity theft.

March 8, 2025 No Comments READ MORE +

What is the primary goal of confidentiality in the CIA triad?

What is the primary goal of confidentiality in the CIA triad?A . To restrict unauthorized access to sensitive data.B . To ensure all data is backed up.C . To protect systems from malware.D . To provide 24/7 access to systems.View AnswerAnswer: A Explanation: Confidentiality ensures only authorized individuals can access...

March 7, 2025 No Comments READ MORE +