Which of the following defines data security?
Which of the following defines data security?A . A method of ensuring physical protection of data.B . Measures to safeguard data from unauthorized access or corruption.C . Techniques for data duplication and storage.D . Ensuring all systems are interconnected.View AnswerAnswer: B Explanation: Data security involves protecting data from unauthorized access,...
Which component is essential for mitigating phishing attacks?
Which component is essential for mitigating phishing attacks?A . Spam filtersB . Advanced encryption methodsC . Physical security measuresD . Hardware-based firewallsView AnswerAnswer: A Explanation: Spam filters reduce the likelihood of phishing emails reaching users, thereby lowering the risk of compromise.
Which of the following can result in data availability loss?
Which of the following can result in data availability loss?A . Unauthorized data encryption by attackersB . Accidental deletion of critical filesC . Prolonged hardware failureD . All of the aboveView AnswerAnswer: D Explanation: Data availability can be compromised by encryption attacks (e.g., ransomware), accidental deletions, or extended hardware failures.
What is the most effective way to mitigate risks associated with unpatched vulnerabilities?
What is the most effective way to mitigate risks associated with unpatched vulnerabilities?A . Encrypting sensitive data.B . Implementing a regular patch management process.C . Conducting monthly data audits.D . Limiting network bandwidth.View AnswerAnswer: B Explanation: Regularly applying patches addresses known vulnerabilities, reducing the risk of exploitation by attackers.
Which two measures can enhance both data integrity and availability?
Which two measures can enhance both data integrity and availability?A . Regular data backups and hash verificationB . Firewalls and intrusion detection systemsC . Biometric authentication and monitoringD . Security awareness training and disaster recovery plansView AnswerAnswer: A, D Explanation: Data backups and hash verification protect integrity, while disaster recovery...
Which two actions can protect the integrity of data?
Which two actions can protect the integrity of data?A . Implementing strong access controlsB . Performing regular data backupsC . Encrypting data during transmissionD . Using hashing techniques for data validationView AnswerAnswer: A, D Explanation: Access controls and hashing prevent unauthorized alterations and verify data accuracy, protecting its integrity.
What is the main purpose of antivirus software?
What is the main purpose of antivirus software?A . To enhance system performance.B . To prevent and remove malware infections.C . To encrypt sensitive data.D . To reduce the need for system backups.View AnswerAnswer: B Explanation: Antivirus software detects, prevents, and removes malware to protect systems from unauthorized threats.