What is the primary advantage of implementing access controls?

What is the primary advantage of implementing access controls?A . To speed up system processes.B . To restrict unauthorized access to sensitive information.C . To simplify data encryption.D . To reduce the need for system audits.View AnswerAnswer: B Explanation: Access controls ensure only authorized individuals can access sensitive information, maintaining...

March 29, 2025 No Comments READ MORE +

What is the purpose of real-time scanning in antivirus software?

What is the purpose of real-time scanning in antivirus software?A . To scan the system only during idle times.B . To monitor and detect threats as they occur.C . To analyze encrypted files for malware.D . To speed up the system’s processing time.View AnswerAnswer: B Explanation: Real-time scanning continuously monitors...

March 29, 2025 No Comments READ MORE +

What is the first step in establishing a secure computing environment?

What is the first step in establishing a secure computing environment?A . Regular software updatesB . Identifying and classifying assetsC . Encrypting all dataD . Installing a firewallView AnswerAnswer: B Explanation: Identifying and classifying assets helps organizations understand what needs protection and prioritize security measures effectively.

March 28, 2025 No Comments READ MORE +

Which of the following best describes a zero-day vulnerability?

Which of the following best describes a zero-day vulnerability?A . A known security flaw with no existing patchesB . A flaw exploited after a patch is releasedC . An outdated security protocolD . A misconfigured firewall settingView AnswerAnswer: A Explanation: A zero-day vulnerability refers to a security flaw discovered by...

March 26, 2025 No Comments READ MORE +

Which attack is an example of compromising availability?

Which attack is an example of compromising availability?A . PhishingB . Denial-of-serviceC . Malware installationD . Credential theftView AnswerAnswer: B Explanation: Denial-of-service attacks compromise availability by overwhelming a system, making it inaccessible to authorized users.

March 24, 2025 No Comments READ MORE +

What is the best method to remove stubborn malware from a system?

What is the best method to remove stubborn malware from a system?A . Reinstalling the operating system.B . Running an antivirus scan in safe mode.C . Disabling internet connectivity.D . Restarting the system in normal mode.View AnswerAnswer: B Explanation: Running antivirus software in safe mode helps remove malware by preventing...

March 23, 2025 No Comments READ MORE +

Which type of malware is designed to track keyboard input?

Which type of malware is designed to track keyboard input?A . RansomwareB . KeyloggerC . WormD . Trojan horseView AnswerAnswer: B Explanation: Keyloggers record keystrokes to capture sensitive information, such as passwords and financial details.

March 21, 2025 No Comments READ MORE +

A ransomware attack primarily affects which security element?

A ransomware attack primarily affects which security element?A . ConfidentialityB . AvailabilityC . IntegrityD . ScalabilityView AnswerAnswer: B Explanation: Ransomware encrypts data and systems, preventing access until a ransom is paid, compromising availability.

March 20, 2025 No Comments READ MORE +

Which of the following is the primary characteristic of malware?

Which of the following is the primary characteristic of malware?A . Software designed to enhance system performance.B . Software intended to disrupt, damage, or gain unauthorized access.C . Software that prevents unauthorized access.D . Software that only affects outdated operating systems.View AnswerAnswer: B Explanation: Malware is malicious software specifically designed...

March 19, 2025 No Comments READ MORE +

Which of the following best describes data security?

Which of the following best describes data security?A . Measures to protect data from unauthorized access.B . The process of ensuring data is stored in physical locations only.C . Backup and recovery techniques for cloud data.D . Procedures to duplicate data across multiple locations.View AnswerAnswer: A Explanation: Data security encompasses...

March 19, 2025 No Comments READ MORE +