What is the best practice for securing sensitive data stored in the cloud?
What is the best practice for securing sensitive data stored in the cloud?A . Storing it in unstructured formatsB . Using strong encryption methodsC . Avoiding access control mechanismsD . Reducing the number of backupsView AnswerAnswer: B Explanation: Encrypting sensitive data in the cloud ensures that even if unauthorized access...
Which of the following reduces the impact of insider threats?
Which of the following reduces the impact of insider threats?A . Encrypting data at rest.B . Implementing role-based access controls.C . Using redundant storage systems.D . Regularly updating antivirus software.View AnswerAnswer: B Explanation: Role-based access controls limit access to data based on job functions, minimizing opportunities for insider threats.
Which of the following ensures data availability?
Which of the following ensures data availability?A . Frequent data backups and redundancy measuresB . Strong passwords and encryption methodsC . Firewalls and intrusion detection systemsD . Regular software updatesView AnswerAnswer: A Explanation: Backups and redundancy ensure data availability by providing alternative ways to access data during system failures.
Which type of malware modifies its code to avoid detection?
Which type of malware modifies its code to avoid detection?A . Polymorphic malwareB . SpywareC . AdwareD . KeyloggerView AnswerAnswer: A Explanation: Polymorphic malware frequently changes its code structure, making it harder for antivirus programs to detect.
Which are the main components of the CIA triad in security?
Which are the main components of the CIA triad in security?A . Authentication, Integrity, AvailabilityB . Confidentiality, Integrity, AvailabilityC . Confidentiality, Accessibility, AuthenticationD . Authorization, Authentication, AccessView AnswerAnswer: B Explanation: The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).
Which of the following best reduces the risk of unauthorized data access?
Which of the following best reduces the risk of unauthorized data access?A . Implementing strong password policiesB . Regularly updating hardware devicesC . Limiting network bandwidthD . Performing frequent hardware auditsView AnswerAnswer: A Explanation: Strong password policies protect against unauthorized access by ensuring only authorized users can access sensitive systems.
Which two actions enhance both confidentiality and availability?
Which two actions enhance both confidentiality and availability?A . Data encryption and failover systemsB . Role-based access controls and redundant backupsC . Regular data audits and physical securityD . Disaster recovery plans and hashing techniquesView AnswerAnswer: A, B Explanation: Encryption ensures confidentiality, while failover systems and backups maintain data availability...
What is the first step in a robust data security strategy?
What is the first step in a robust data security strategy?A . Encrypting all sensitive filesB . Identifying and classifying sensitive dataC . Deploying a firewallD . Implementing multi-factor authenticationView AnswerAnswer: B Explanation: Identifying and classifying data helps prioritize protection for sensitive information and allocate resources effectively.
What is the primary purpose of multi-factor authentication (MFA)?
What is the primary purpose of multi-factor authentication (MFA)?A . To reduce password reset requestsB . To enhance user convenienceC . To strengthen access security by requiring multiple verification methodsD . To eliminate the need for strong passwordsView AnswerAnswer: C Explanation: MFA adds layers of authentication, making it more difficult...
What is the primary risk of not updating antivirus software regularly?
What is the primary risk of not updating antivirus software regularly?A . Slower system performance.B . Inability to detect new types of malware.C . Reduced file storage capacity.D . Increased encryption overhead.View AnswerAnswer: B Explanation: Outdated antivirus software lacks recognition of the latest malware signatures, leaving systems vulnerable to emerging...