What is the primary advantage of implementing access controls?
What is the primary advantage of implementing access controls?A . To speed up system processes.B . To restrict unauthorized access to sensitive information.C . To simplify data encryption.D . To reduce the need for system audits.View AnswerAnswer: B Explanation: Access controls ensure only authorized individuals can access sensitive information, maintaining...
What is the purpose of real-time scanning in antivirus software?
What is the purpose of real-time scanning in antivirus software?A . To scan the system only during idle times.B . To monitor and detect threats as they occur.C . To analyze encrypted files for malware.D . To speed up the system’s processing time.View AnswerAnswer: B Explanation: Real-time scanning continuously monitors...
What is the first step in establishing a secure computing environment?
What is the first step in establishing a secure computing environment?A . Regular software updatesB . Identifying and classifying assetsC . Encrypting all dataD . Installing a firewallView AnswerAnswer: B Explanation: Identifying and classifying assets helps organizations understand what needs protection and prioritize security measures effectively.
Which of the following best describes a zero-day vulnerability?
Which of the following best describes a zero-day vulnerability?A . A known security flaw with no existing patchesB . A flaw exploited after a patch is releasedC . An outdated security protocolD . A misconfigured firewall settingView AnswerAnswer: A Explanation: A zero-day vulnerability refers to a security flaw discovered by...
Which attack is an example of compromising availability?
Which attack is an example of compromising availability?A . PhishingB . Denial-of-serviceC . Malware installationD . Credential theftView AnswerAnswer: B Explanation: Denial-of-service attacks compromise availability by overwhelming a system, making it inaccessible to authorized users.
What is the best method to remove stubborn malware from a system?
What is the best method to remove stubborn malware from a system?A . Reinstalling the operating system.B . Running an antivirus scan in safe mode.C . Disabling internet connectivity.D . Restarting the system in normal mode.View AnswerAnswer: B Explanation: Running antivirus software in safe mode helps remove malware by preventing...
Which type of malware is designed to track keyboard input?
Which type of malware is designed to track keyboard input?A . RansomwareB . KeyloggerC . WormD . Trojan horseView AnswerAnswer: B Explanation: Keyloggers record keystrokes to capture sensitive information, such as passwords and financial details.
A ransomware attack primarily affects which security element?
A ransomware attack primarily affects which security element?A . ConfidentialityB . AvailabilityC . IntegrityD . ScalabilityView AnswerAnswer: B Explanation: Ransomware encrypts data and systems, preventing access until a ransom is paid, compromising availability.
Which of the following is the primary characteristic of malware?
Which of the following is the primary characteristic of malware?A . Software designed to enhance system performance.B . Software intended to disrupt, damage, or gain unauthorized access.C . Software that prevents unauthorized access.D . Software that only affects outdated operating systems.View AnswerAnswer: B Explanation: Malware is malicious software specifically designed...
Which of the following best describes data security?
Which of the following best describes data security?A . Measures to protect data from unauthorized access.B . The process of ensuring data is stored in physical locations only.C . Backup and recovery techniques for cloud data.D . Procedures to duplicate data across multiple locations.View AnswerAnswer: A Explanation: Data security encompasses...