What type of loss does this represent?
An employee accidentally deletes critical files. What type of loss does this represent?A . Loss of confidentialityB . Loss of availabilityC . Loss of integrityD . Regulatory non-complianceView AnswerAnswer: C Explanation: When files are altered or deleted without intent, it constitutes a loss of data integrity, affecting its reliability.
Which is NOT a core element of security?
Which is NOT a core element of security?A . ConfidentialityB . Data auditingC . IntegrityD . AvailabilityView AnswerAnswer: B Explanation: Core elements of security include confidentiality, integrity, and availability (CIA triad). Auditing supports security but is not a core element.
Which type of security loss occurs due to a ransomware attack?
Which type of security loss occurs due to a ransomware attack?A . Loss of availabilityB . Loss of confidentialityC . Loss of integrityD . Regulatory penaltiesView AnswerAnswer: A Explanation: Ransomware attacks primarily affect availability by restricting access to systems and data until a ransom is paid.
What is the primary advantage of implementing access controls?
What is the primary advantage of implementing access controls?A . To speed up system processes.B . To restrict unauthorized access to sensitive information.C . To simplify data encryption.D . To reduce the need for system audits.View AnswerAnswer: B Explanation: Access controls ensure only authorized individuals can access sensitive information, maintaining...
What is the purpose of real-time scanning in antivirus software?
What is the purpose of real-time scanning in antivirus software?A . To scan the system only during idle times.B . To monitor and detect threats as they occur.C . To analyze encrypted files for malware.D . To speed up the system’s processing time.View AnswerAnswer: B Explanation: Real-time scanning continuously monitors...
What is the first step in establishing a secure computing environment?
What is the first step in establishing a secure computing environment?A . Regular software updatesB . Identifying and classifying assetsC . Encrypting all dataD . Installing a firewallView AnswerAnswer: B Explanation: Identifying and classifying assets helps organizations understand what needs protection and prioritize security measures effectively.
Which of the following best describes a zero-day vulnerability?
Which of the following best describes a zero-day vulnerability?A . A known security flaw with no existing patchesB . A flaw exploited after a patch is releasedC . An outdated security protocolD . A misconfigured firewall settingView AnswerAnswer: A Explanation: A zero-day vulnerability refers to a security flaw discovered by...
Which attack is an example of compromising availability?
Which attack is an example of compromising availability?A . PhishingB . Denial-of-serviceC . Malware installationD . Credential theftView AnswerAnswer: B Explanation: Denial-of-service attacks compromise availability by overwhelming a system, making it inaccessible to authorized users.
What is the best method to remove stubborn malware from a system?
What is the best method to remove stubborn malware from a system?A . Reinstalling the operating system.B . Running an antivirus scan in safe mode.C . Disabling internet connectivity.D . Restarting the system in normal mode.View AnswerAnswer: B Explanation: Running antivirus software in safe mode helps remove malware by preventing...
Which type of malware is designed to track keyboard input?
Which type of malware is designed to track keyboard input?A . RansomwareB . KeyloggerC . WormD . Trojan horseView AnswerAnswer: B Explanation: Keyloggers record keystrokes to capture sensitive information, such as passwords and financial details.