What is the purpose of a Public Key Infrastructure (PKI)?

What is the purpose of a Public Key Infrastructure (PKI)?A . To manage private keysB . To manage digital certificates and public keysC . To manage user accountsD . To manage encryption algorithmsView AnswerAnswer: B

March 3, 2025 No Comments READ MORE +

What is email spam?

What is email spam?A . Sensitive information sent via emailB . Unsolicited and unwanted emailC . Emails from trusted sourcesD . Encrypted emailView AnswerAnswer: B

February 27, 2025 No Comments READ MORE +

Which of the following solutions would be the most appropriate for ensuring the privacy of your conversation?

You want to send a private message to a friend using an instant messaging app. Which of the following solutions would be the most appropriate for ensuring the privacy of your conversation?A . TORB . A proxy serverC . Transfer encryptionD . End-to-end encryptionView AnswerAnswer: D

February 26, 2025 No Comments READ MORE +

What is the most effective type of phishing for targeting key executives within an organization?

What is the most effective type of phishing for targeting key executives within an organization?A . SpearphishingB . WhalingC . VishingD . SmishingView AnswerAnswer: B

February 26, 2025 No Comments READ MORE +

Which of the following legal concepts is concerned with compensating someone for harm caused by a security breach?

Which of the following legal concepts is concerned with compensating someone for harm caused by a security breach?A . Public lawB . Copyright lawC . Financial compensation claimsD . LiabilityView AnswerAnswer: D

February 24, 2025 No Comments READ MORE +

Which cloud deployment model would be the best choice for them?

Dion Solutions, a large enterprise company, needs to deploy a new software application for their employees to use. They want to make sure that their employees have access to the latest version of the software and that it is easy to manage. Which cloud deployment model would be the best...

February 24, 2025 No Comments READ MORE +

Which of the following devices is an example of an IoT device?

Which of the following devices is an example of an IoT device?A . RouterB . SmartphoneC . Desktop computerD . PrinterView AnswerAnswer: B

February 22, 2025 No Comments READ MORE +

Which of the following fields in an X.509 certificate identifies the domain name of a website?

Which of the following fields in an X.509 certificate identifies the domain name of a website?A . IssuerB . SubjectC . ValidityD . subjectAltNameView AnswerAnswer: D

February 21, 2025 No Comments READ MORE +

Which of the following terms refers to the deliberate act of accessing, manipulating, or deleting data without authorization?

Which of the following terms refers to the deliberate act of accessing, manipulating, or deleting data without authorization?A . FirewallB . EncryptionC . PhishingD . HackingView AnswerAnswer: D

February 19, 2025 No Comments READ MORE +

What is multi-factor authentication (MFA)?

What is multi-factor authentication (MFA)?A . A tool used to bypass authenticationB . A security measure that uses only one factor to authenticate a userC . A security measure that uses multiple factors to authenticate a userD . A tool used to securely store passwordsView AnswerAnswer: C

February 19, 2025 No Comments READ MORE +