What are botnets?
What are botnets?A . An attack that manipulates individuals into revealing sensitive information or performing certain actions.B . A network of compromised computers controlled by a central entity to carry out malicious activities.C . A form of cyber attack that attempts to gain unauthorized access to a network.D . A...
Which of the following represents a strong passphrase for securing a wireless SoHo network?
Which of the following represents a strong passphrase for securing a wireless SoHo network?A . 12345678B . P@ssword!C . CorrectHorseBatteryStapleD . jumpr0peView AnswerAnswer: C Explanation: A strong passphrase should be long, include a combination of uppercase and lowercase letters, numbers, and special characters. "CorrectHorseBatteryStaple" represents a strong passphrase as it...
What is a man-in-the-middle attack?
What is a man-in-the-middle attack?A . An attack that intercepts and manipulates communication between two parties.B . An attack that exploits vulnerabilities in a device's software.C . An attack that targets Internet of Things devices.D . An attack where an insider intentionally releases sensitive information.View AnswerAnswer: A Explanation: A man-in-the-middle...
What is the main difference between a public and a private network?
What is the main difference between a public and a private network?A . Public networks are secured, while private networks are notB . Private networks are more expensive to set up than public networksC . Public networks use public IP addresses, while private networks use private IP addressesD . Private...
Which of the following is a characteristic of a network-based firewall?
Which of the following is a characteristic of a network-based firewall?A . Inspects and filters traffic at the application layerB . Operates at the data link layerC . Provides protection against external threats onlyD . Requires software installed on client devicesView AnswerAnswer: C Explanation: Option 1: Incorrect. A network-based firewall...
Which of the following best describes an Advanced Persistent Threat (APT)?
Which of the following best describes an Advanced Persistent Threat (APT)?A . An unintentional and harmless interaction with a computer systemB . A security incident caused by human error or negligenceC . A targeted cyber attack that aims to gain unauthorized access to sensitive informationD . A type of malware...
Which security technology uses an agent-based approach to protect endpoints and is designed to detect and prevent malicious activities?
Which security technology uses an agent-based approach to protect endpoints and is designed to detect and prevent malicious activities?A . FirewallB . Intrusion Prevention System (IPS)C . Data Loss Prevention (DLP)D . Advanced Malware Protection (AMP)View AnswerAnswer: D Explanation: Option 1: Incorrect. A firewall is a network security device that...
Which of the following is an integral part of the CIA triad in cybersecurity?
Which of the following is an integral part of the CIA triad in cybersecurity?A . Data loss prevention (DLP)B . Two-factor authentication (2FA)C . Intrusion Detection System (IDS)D . FirewallView AnswerAnswer: B Explanation: The CIA triad in cybersecurity stands for confidentiality, integrity, and availability. Two-factor authentication (2FA) ensures confidentiality by...
What is encryption?
What is encryption?A . A process of converting plaintext into binary code to enhance data accessibilityB . A process of converting binary code into plaintext to improve data reliabilityC . A process of converting plaintext into ciphertext to protect data confidentialityD . A process of converting ciphertext into plaintext to...
What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?
What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?A . HoneypotB . VirtualizationC . DMZD . ProxyView AnswerAnswer: A Explanation: A honeypot is a security technique that involves setting up a decoy system or network to attract potential attackers. The...