What is the best practice for securing sensitive data stored in the cloud?

What is the best practice for securing sensitive data stored in the cloud?A . Storing it in unstructured formatsB . Using strong encryption methodsC . Avoiding access control mechanismsD . Reducing the number of backupsView AnswerAnswer: B Explanation: Encrypting sensitive data in the cloud ensures that even if unauthorized access...

April 24, 2025 No Comments READ MORE +

Which of the following reduces the impact of insider threats?

Which of the following reduces the impact of insider threats?A . Encrypting data at rest.B . Implementing role-based access controls.C . Using redundant storage systems.D . Regularly updating antivirus software.View AnswerAnswer: B Explanation: Role-based access controls limit access to data based on job functions, minimizing opportunities for insider threats.

April 22, 2025 No Comments READ MORE +

Which of the following ensures data availability?

Which of the following ensures data availability?A . Frequent data backups and redundancy measuresB . Strong passwords and encryption methodsC . Firewalls and intrusion detection systemsD . Regular software updatesView AnswerAnswer: A Explanation: Backups and redundancy ensure data availability by providing alternative ways to access data during system failures.

April 22, 2025 No Comments READ MORE +

Which type of malware modifies its code to avoid detection?

Which type of malware modifies its code to avoid detection?A . Polymorphic malwareB . SpywareC . AdwareD . KeyloggerView AnswerAnswer: A Explanation: Polymorphic malware frequently changes its code structure, making it harder for antivirus programs to detect.

April 22, 2025 No Comments READ MORE +

Which are the main components of the CIA triad in security?

Which are the main components of the CIA triad in security?A . Authentication, Integrity, AvailabilityB . Confidentiality, Integrity, AvailabilityC . Confidentiality, Accessibility, AuthenticationD . Authorization, Authentication, AccessView AnswerAnswer: B Explanation: The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).

April 20, 2025 No Comments READ MORE +

Which of the following best reduces the risk of unauthorized data access?

Which of the following best reduces the risk of unauthorized data access?A . Implementing strong password policiesB . Regularly updating hardware devicesC . Limiting network bandwidthD . Performing frequent hardware auditsView AnswerAnswer: A Explanation: Strong password policies protect against unauthorized access by ensuring only authorized users can access sensitive systems.

April 19, 2025 No Comments READ MORE +

Which two actions enhance both confidentiality and availability?

Which two actions enhance both confidentiality and availability?A . Data encryption and failover systemsB . Role-based access controls and redundant backupsC . Regular data audits and physical securityD . Disaster recovery plans and hashing techniquesView AnswerAnswer: A, B Explanation: Encryption ensures confidentiality, while failover systems and backups maintain data availability...

April 16, 2025 No Comments READ MORE +

What is the first step in a robust data security strategy?

What is the first step in a robust data security strategy?A . Encrypting all sensitive filesB . Identifying and classifying sensitive dataC . Deploying a firewallD . Implementing multi-factor authenticationView AnswerAnswer: B Explanation: Identifying and classifying data helps prioritize protection for sensitive information and allocate resources effectively.

April 14, 2025 No Comments READ MORE +

What is the primary purpose of multi-factor authentication (MFA)?

What is the primary purpose of multi-factor authentication (MFA)?A . To reduce password reset requestsB . To enhance user convenienceC . To strengthen access security by requiring multiple verification methodsD . To eliminate the need for strong passwordsView AnswerAnswer: C Explanation: MFA adds layers of authentication, making it more difficult...

April 13, 2025 No Comments READ MORE +

What is the primary risk of not updating antivirus software regularly?

What is the primary risk of not updating antivirus software regularly?A . Slower system performance.B . Inability to detect new types of malware.C . Reduced file storage capacity.D . Increased encryption overhead.View AnswerAnswer: B Explanation: Outdated antivirus software lacks recognition of the latest malware signatures, leaving systems vulnerable to emerging...

April 13, 2025 No Comments READ MORE +