Which of the following is an integral part of the CIA triad in cybersecurity?

Which of the following is an integral part of the CIA triad in cybersecurity?A . Data loss prevention (DLP)B . Two-factor authentication (2FA)C . Intrusion Detection System (IDS)D . FirewallView AnswerAnswer: B Explanation: The CIA triad in cybersecurity stands for confidentiality, integrity, and availability. Two-factor authentication (2FA) ensures confidentiality by...

March 16, 2025 No Comments READ MORE +

What is encryption?

What is encryption?A . A process of converting plaintext into binary code to enhance data accessibilityB . A process of converting binary code into plaintext to improve data reliabilityC . A process of converting plaintext into ciphertext to protect data confidentialityD . A process of converting ciphertext into plaintext to...

March 16, 2025 No Comments READ MORE +

What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?

What type of security technique involves setting up a decoy system or network to lure and trap potential attackers?A . HoneypotB . VirtualizationC . DMZD . ProxyView AnswerAnswer: A Explanation: A honeypot is a security technique that involves setting up a decoy system or network to attract potential attackers. The...

March 15, 2025 No Comments READ MORE +

Which network infrastructure component allows for the translation of domain names to IP addresses?

Which network infrastructure component allows for the translation of domain names to IP addresses?A . FirewallB . RouterC . DNS serverD . DHCP serverView AnswerAnswer: C Explanation: DNS (Domain Name System) is a network infrastructure component that translates domain names (e.g., www.example.com) into their corresponding IP addresses (e.g., 192.168.1.1). DNS...

March 14, 2025 No Comments READ MORE +

Which of the following is an example of multifactor authentication?

Which of the following is an example of multifactor authentication?A . Using a fingerprint scan onlyB . Using a biometric scan and a passcodeC . Using a username and password onlyD . Using a smart card and a PINView AnswerAnswer: D Explanation: Multifactor authentication refers to the use of two...

March 14, 2025 No Comments READ MORE +

Which protocol is used to assign IP addresses to devices on a network?

Which protocol is used to assign IP addresses to devices on a network?A . ICMPB . DHCPC . UDPD . TCPView AnswerAnswer: B Explanation: DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses dynamically to devices on a network. Instead of manually configuring IP addresses on each device,...

March 13, 2025 No Comments READ MORE +

Which network security feature helps protect against unauthorized data access and ensures confidentiality of sensitive information?

Which network security feature helps protect against unauthorized data access and ensures confidentiality of sensitive information?A . FirewallB . VPNC . Intrusion Detection SystemD . AntivirusView AnswerAnswer: B Explanation: Option 1: Incorrect. A firewall is responsible for controlling incoming and outgoing network traffic based on predetermined security rules. While it...

March 11, 2025 No Comments READ MORE +

Which protocol is used for communication between web browsers and web servers?

Which protocol is used for communication between web browsers and web servers?A . ICMPB . TCPC . UDPD . HTTPView AnswerAnswer: D Explanation: HTTP (Hypertext Transfer Protocol) is the protocol used for communication between web browsers (client) and web servers. It allows for the exchange of hypertext, which includes text,...

March 10, 2025 No Comments READ MORE +

Which of the following network technologies is commonly used to connect devices within a local area network (LAN)?

Which of the following network technologies is commonly used to connect devices within a local area network (LAN)?A . Wi-FiB . EthernetC . DSLD . VPNView AnswerAnswer: B Explanation: Ethernet is a widely used network technology for connecting devices within a local area network (LAN). It provides a physical and...

March 9, 2025 No Comments READ MORE +

Which of the following features of the Cisco Identity Services Engine (ISE) allows network administrators to define policies for controlling access to network resources based on user identities and user or group attributes?

Which of the following features of the Cisco Identity Services Engine (ISE) allows network administrators to define policies for controlling access to network resources based on user identities and user or group attributes?A . Network Access ProfilesB . Identity FirewallC . ProfilingD . TrustSecView AnswerAnswer: C Explanation: Option 1: Network...

March 9, 2025 No Comments READ MORE +