What is a major security concern when installing mobile applications from unknown sources?
What is a major security concern when installing mobile applications from unknown sources?A . Malware infectionB . Incompatible hardware componentsC . Reduced storage capacityD . Limited network connectivityView AnswerAnswer: A
What is the primary function of an endpoint firewall?
What is the primary function of an endpoint firewall?A . To protect a single device from unauthorized access or attacksB . To store data securelyC . To manage hardware componentsD . To improve network performanceView AnswerAnswer: A
Which of the following solutions would be the most appropriate for protecting your privacy?
You are concerned about your internet activity being tracked by your ISP. Which of the following solutions would be the most appropriate for protecting your privacy?A . End-to-end encryptionB . TORC . Transfer encryptionD . Disabling your firewallView AnswerAnswer: B
Which of the following methods can be used to ensure integrity of data during transmission?
Which of the following methods can be used to ensure integrity of data during transmission?A . PasswordsB . EncryptionC . Two-factor authenticationD . RedundancyView AnswerAnswer: B
Which protocol provides secure communication over the Internet by encrypting data in transit?
Which protocol provides secure communication over the Internet by encrypting data in transit?A . SMTPB . FTPC . HTTPD . HTTPSView AnswerAnswer: D
Which of the following pertains to the possible damage resulting from mistakes and service disruptions?
Which of the following pertains to the possible damage resulting from mistakes and service disruptions?A . Cost ReductionB . Operational RisksC . Increased ProductivityD . System ErrorsView AnswerAnswer: B
Which backup rotation scheme uses a sequence of full, differential, and incremental backups to create a backup history?
Which backup rotation scheme uses a sequence of full, differential, and incremental backups to create a backup history?A . Tower of HanoiB . Grandfather-Father-SonC . 3-2-1 Backup RuleD . Monthly-Weekly-DailyView AnswerAnswer: B
What is the purpose of the GDPR?
What is the purpose of the GDPR?A . To encourage the collection and sharing of personal data without restrictionB . To encourage the use of insecure data storage methodsC . The GDPR is a type of virus that infects computer systems and steals personal informationD . To protect personal information...
What is the purpose of a Public Key Infrastructure (PKI)?
What is the purpose of a Public Key Infrastructure (PKI)?A . To manage private keysB . To manage digital certificates and public keysC . To manage user accountsD . To manage encryption algorithmsView AnswerAnswer: B
What is email spam?
What is email spam?A . Sensitive information sent via emailB . Unsolicited and unwanted emailC . Emails from trusted sourcesD . Encrypted emailView AnswerAnswer: B