Which of the following is a characteristic of weak encryption algorithms?
Which of the following is a characteristic of weak encryption algorithms?A . They support secure communication protocols.B . They are susceptible to cryptanalysis attacks.C . They are resistant to brute force attacks.D . They provide encryption keys with longer bit lengths.View AnswerAnswer: B Explanation: Weak encryption algorithms are those that...
Which of the following is NOT a component of AAA?
Which of the following is NOT a component of AAA?A . AuthorizationB . AccountabilityC . AuthenticationD . Accurate accountingView AnswerAnswer: D Explanation: The components of AAA are Authentication, Authorization, and Accounting. Accounting refers to the process of tracking and logging user activities, but its focus is not on accuracy. Instead,...
Which of the following is true about security policies and procedures?
Which of the following is true about security policies and procedures?A . They should be regularly reviewed and updated to reflect changing threats and technologiesB . They should only be accessible to the IT department.C . They should be documented once and never changed.D . They should be kept confidential...
Which of the following statements about multi-factor authentication (MFA) is correct?
Which of the following statements about multi-factor authentication (MFA) is correct?A . MFA is a security measure that requires users to provide two or more forms of identification to gain access to a system or application.B . MFA is a security measure that requires users to provide only one form...
Which encryption method provides the highest level of security for a wireless SoHo network?
Which encryption method provides the highest level of security for a wireless SoHo network?A . WPA2B . WEPC . WPAD . TKIPView AnswerAnswer: A Explanation: WPA2 (Wi-Fi Protected Access 2) is currently the most secure encryption method for wireless networks. It uses the Advanced Encryption Standard (AES) algorithm, which provides...
What is the purpose of a firewall in a network security system?
What is the purpose of a firewall in a network security system?A . To prevent unauthorized access to or from private networksB . To scan and filter network traffic for potential threatsC . To encrypt data transmitted over the networkD . To provide secure remote access to the networkView AnswerAnswer:...
Which of the following is an example of a network vulnerability?
Which of the following is an example of a network vulnerability?A . Encrypting sensitive dataB . Running outdated and unpatched softwareC . Using a strong passwordD . Implementing a firewallView AnswerAnswer: B Explanation: Running outdated and unpatched software is an example of a network vulnerability. Software updates often include patches...
What is a digital certificate used for in the context of cybersecurity?
What is a digital certificate used for in the context of cybersecurity?A . Encrypting dataB . Verifying the identity of an entityC . Creating a secure tunnelD . Decrypting dataView AnswerAnswer: B Explanation: A digital certificate is an electronic document used to prove the authenticity and identity of an entity,...
What is the primary purpose of a VPN (Virtual Private Network)?
What is the primary purpose of a VPN (Virtual Private Network)?A . To encrypt email communicationsB . To secure wireless network connectionsC . To establish a secure remote connection over a public networkD . To protect against malware attacksView AnswerAnswer: C Explanation: A VPN is designed to provide secure, encrypted...
What is one of the ethical principles that guide the code of ethics for cybersecurity professionals?
What is one of the ethical principles that guide the code of ethics for cybersecurity professionals?A . ImpersonationB . ConfidentialityC . AnonymityD . DiscriminationView AnswerAnswer: B Explanation: Confidentiality is one of the key ethical principles for cybersecurity professionals. It requires professionals to respect the privacy of individuals and organizations by...