Which of the following defines data security?

Which of the following defines data security?A . A method of ensuring physical protection of data.B . Measures to safeguard data from unauthorized access or corruption.C . Techniques for data duplication and storage.D . Ensuring all systems are interconnected.View AnswerAnswer: B Explanation: Data security involves protecting data from unauthorized access,...

January 25, 2025 No Comments READ MORE +

Which component is essential for mitigating phishing attacks?

Which component is essential for mitigating phishing attacks?A . Spam filtersB . Advanced encryption methodsC . Physical security measuresD . Hardware-based firewallsView AnswerAnswer: A Explanation: Spam filters reduce the likelihood of phishing emails reaching users, thereby lowering the risk of compromise.

January 22, 2025 No Comments READ MORE +

Which of the following can result in data availability loss?

Which of the following can result in data availability loss?A . Unauthorized data encryption by attackersB . Accidental deletion of critical filesC . Prolonged hardware failureD . All of the aboveView AnswerAnswer: D Explanation: Data availability can be compromised by encryption attacks (e.g., ransomware), accidental deletions, or extended hardware failures.

January 19, 2025 No Comments READ MORE +

What is the most effective way to mitigate risks associated with unpatched vulnerabilities?

What is the most effective way to mitigate risks associated with unpatched vulnerabilities?A . Encrypting sensitive data.B . Implementing a regular patch management process.C . Conducting monthly data audits.D . Limiting network bandwidth.View AnswerAnswer: B Explanation: Regularly applying patches addresses known vulnerabilities, reducing the risk of exploitation by attackers.

January 19, 2025 No Comments READ MORE +

Which two measures can enhance both data integrity and availability?

Which two measures can enhance both data integrity and availability?A . Regular data backups and hash verificationB . Firewalls and intrusion detection systemsC . Biometric authentication and monitoringD . Security awareness training and disaster recovery plansView AnswerAnswer: A, D Explanation: Data backups and hash verification protect integrity, while disaster recovery...

January 19, 2025 No Comments READ MORE +

Which two actions can protect the integrity of data?

Which two actions can protect the integrity of data?A . Implementing strong access controlsB . Performing regular data backupsC . Encrypting data during transmissionD . Using hashing techniques for data validationView AnswerAnswer: A, D Explanation: Access controls and hashing prevent unauthorized alterations and verify data accuracy, protecting its integrity.

January 18, 2025 No Comments READ MORE +

What is the main purpose of antivirus software?

What is the main purpose of antivirus software?A . To enhance system performance.B . To prevent and remove malware infections.C . To encrypt sensitive data.D . To reduce the need for system backups.View AnswerAnswer: B Explanation: Antivirus software detects, prevents, and removes malware to protect systems from unauthorized threats.

January 18, 2025 No Comments READ MORE +