What are botnets?

What are botnets?A . An attack that manipulates individuals into revealing sensitive information or performing certain actions.B . A network of compromised computers controlled by a central entity to carry out malicious activities.C . A form of cyber attack that attempts to gain unauthorized access to a network.D . A...

March 26, 2025 No Comments READ MORE +

Which of the following represents a strong passphrase for securing a wireless SoHo network?

Which of the following represents a strong passphrase for securing a wireless SoHo network?A . 12345678B . P@ssword!C . CorrectHorseBatteryStapleD . jumpr0peView AnswerAnswer: C Explanation: A strong passphrase should be long, include a combination of uppercase and lowercase letters, numbers, and special characters. "CorrectHorseBatteryStaple" represents a strong passphrase as it...

March 24, 2025 No Comments READ MORE +

What is a man-in-the-middle attack?

What is a man-in-the-middle attack?A . An attack that intercepts and manipulates communication between two parties.B . An attack that exploits vulnerabilities in a device's software.C . An attack that targets Internet of Things devices.D . An attack where an insider intentionally releases sensitive information.View AnswerAnswer: A Explanation: A man-in-the-middle...

March 24, 2025 No Comments READ MORE +

What is the main difference between a public and a private network?

What is the main difference between a public and a private network?A . Public networks are secured, while private networks are notB . Private networks are more expensive to set up than public networksC . Public networks use public IP addresses, while private networks use private IP addressesD . Private...

March 23, 2025 No Comments READ MORE +

Which of the following is a characteristic of a network-based firewall?

Which of the following is a characteristic of a network-based firewall?A . Inspects and filters traffic at the application layerB . Operates at the data link layerC . Provides protection against external threats onlyD . Requires software installed on client devicesView AnswerAnswer: C Explanation: Option 1: Incorrect. A network-based firewall...

March 19, 2025 No Comments READ MORE +

Which of the following best describes an Advanced Persistent Threat (APT)?

Which of the following best describes an Advanced Persistent Threat (APT)?A . An unintentional and harmless interaction with a computer systemB . A security incident caused by human error or negligenceC . A targeted cyber attack that aims to gain unauthorized access to sensitive informationD . A type of malware...

March 17, 2025 No Comments READ MORE +

Which security technology uses an agent-based approach to protect endpoints and is designed to detect and prevent malicious activities?

Which security technology uses an agent-based approach to protect endpoints and is designed to detect and prevent malicious activities?A . FirewallB . Intrusion Prevention System (IPS)C . Data Loss Prevention (DLP)D . Advanced Malware Protection (AMP)View AnswerAnswer: D Explanation: Option 1: Incorrect. A firewall is a network security device that...

March 16, 2025 No Comments READ MORE +

Which of the following is an integral part of the CIA triad in cybersecurity?

Which of the following is an integral part of the CIA triad in cybersecurity?A . Data loss prevention (DLP)B . Two-factor authentication (2FA)C . Intrusion Detection System (IDS)D . FirewallView AnswerAnswer: B Explanation: The CIA triad in cybersecurity stands for confidentiality, integrity, and availability. Two-factor authentication (2FA) ensures confidentiality by...

March 16, 2025 No Comments READ MORE +

What is encryption?

What is encryption?A . A process of converting plaintext into binary code to enhance data accessibilityB . A process of converting binary code into plaintext to improve data reliabilityC . A process of converting plaintext into ciphertext to protect data confidentialityD . A process of converting ciphertext into plaintext to...

March 16, 2025 No Comments READ MORE +

What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?

What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?A . HoneypotB . VirtualizationC . DMZD . ProxyView AnswerAnswer: A Explanation: A honeypot is a security technique that involves setting up a decoy system or network to attract potential attackers. The...

March 15, 2025 No Comments READ MORE +