What is a major security concern when installing mobile applications from unknown sources?

What is a major security concern when installing mobile applications from unknown sources?A . Malware infectionB . Incompatible hardware componentsC . Reduced storage capacityD . Limited network connectivityView AnswerAnswer: A

March 8, 2025 No Comments READ MORE +

What is the primary function of an endpoint firewall?

What is the primary function of an endpoint firewall?A . To protect a single device from unauthorized access or attacksB . To store data securelyC . To manage hardware componentsD . To improve network performanceView AnswerAnswer: A

March 8, 2025 No Comments READ MORE +

Which of the following solutions would be the most appropriate for protecting your privacy?

You are concerned about your internet activity being tracked by your ISP. Which of the following solutions would be the most appropriate for protecting your privacy?A . End-to-end encryptionB . TORC . Transfer encryptionD . Disabling your firewallView AnswerAnswer: B

March 6, 2025 No Comments READ MORE +

Which of the following methods can be used to ensure integrity of data during transmission?

Which of the following methods can be used to ensure integrity of data during transmission?A . PasswordsB . EncryptionC . Two-factor authenticationD . RedundancyView AnswerAnswer: B

March 5, 2025 No Comments READ MORE +

Which protocol provides secure communication over the Internet by encrypting data in transit?

Which protocol provides secure communication over the Internet by encrypting data in transit?A . SMTPB . FTPC . HTTPD . HTTPSView AnswerAnswer: D

March 5, 2025 No Comments READ MORE +

Which of the following pertains to the possible damage resulting from mistakes and service disruptions?

Which of the following pertains to the possible damage resulting from mistakes and service disruptions?A . Cost ReductionB . Operational RisksC . Increased ProductivityD . System ErrorsView AnswerAnswer: B

March 4, 2025 No Comments READ MORE +

Which backup rotation scheme uses a sequence of full, differential, and incremental backups to create a backup history?

Which backup rotation scheme uses a sequence of full, differential, and incremental backups to create a backup history?A . Tower of HanoiB . Grandfather-Father-SonC . 3-2-1 Backup RuleD . Monthly-Weekly-DailyView AnswerAnswer: B

March 4, 2025 No Comments READ MORE +

What is the purpose of the GDPR?

What is the purpose of the GDPR?A . To encourage the collection and sharing of personal data without restrictionB . To encourage the use of insecure data storage methodsC . The GDPR is a type of virus that infects computer systems and steals personal informationD . To protect personal information...

March 4, 2025 No Comments READ MORE +

What is the purpose of a Public Key Infrastructure (PKI)?

What is the purpose of a Public Key Infrastructure (PKI)?A . To manage private keysB . To manage digital certificates and public keysC . To manage user accountsD . To manage encryption algorithmsView AnswerAnswer: B

March 3, 2025 No Comments READ MORE +

What is email spam?

What is email spam?A . Sensitive information sent via emailB . Unsolicited and unwanted emailC . Emails from trusted sourcesD . Encrypted emailView AnswerAnswer: B

February 27, 2025 No Comments READ MORE +