What is a key characteristic of hashing in security?
What is a key characteristic of hashing in security?A . Converts data into unreadable encrypted formats.B . Verifies data integrity by detecting unauthorized changes.C . Ensures uninterrupted access to sensitive information.D . Enhances data redundancy for recovery purposes.View AnswerAnswer: B Explanation: Hashing generates unique values based on data input, allowing...
What is the primary risk of unencrypted sensitive data?
What is the primary risk of unencrypted sensitive data?A . Increased storage costsB . Loss of data availabilityC . Exposure during unauthorized accessD . Longer processing timesView AnswerAnswer: C Explanation: Unencrypted sensitive data is vulnerable to exposure during unauthorized access, compromising confidentiality.
What kind of attack involves overwhelming a server with traffic to make it unavailable?
What kind of attack involves overwhelming a server with traffic to make it unavailable?A . Phishing attackB . Denial-of-service attackC . Malware injectionD . Social engineering attackView AnswerAnswer: B Explanation: Denial-of-service attacks flood servers with excessive traffic, disrupting services and making systems inaccessible to legitimate users.
Which of the following best describes a man-in-the-middle attack?
Which of the following best describes a man-in-the-middle attack?A . Exploiting software vulnerabilities to gain access.B . Intercepting and altering communications between two parties.C . Overloading systems with traffic to deny service.D . Distributing malware to gain system control.View AnswerAnswer: B Explanation: A man-in-the-middle attack intercepts and manipulates communications between...
What type of loss does this represent?
An employee accidentally deletes critical files. What type of loss does this represent?A . Loss of confidentialityB . Loss of availabilityC . Loss of integrityD . Regulatory non-complianceView AnswerAnswer: C Explanation: When files are altered or deleted without intent, it constitutes a loss of data integrity, affecting its reliability.
Which is NOT a core element of security?
Which is NOT a core element of security?A . ConfidentialityB . Data auditingC . IntegrityD . AvailabilityView AnswerAnswer: B Explanation: Core elements of security include confidentiality, integrity, and availability (CIA triad). Auditing supports security but is not a core element.
Which type of security loss occurs due to a ransomware attack?
Which type of security loss occurs due to a ransomware attack?A . Loss of availabilityB . Loss of confidentialityC . Loss of integrityD . Regulatory penaltiesView AnswerAnswer: A Explanation: Ransomware attacks primarily affect availability by restricting access to systems and data until a ransom is paid.
What is the primary advantage of implementing access controls?
What is the primary advantage of implementing access controls?A . To speed up system processes.B . To restrict unauthorized access to sensitive information.C . To simplify data encryption.D . To reduce the need for system audits.View AnswerAnswer: B Explanation: Access controls ensure only authorized individuals can access sensitive information, maintaining...
What is the purpose of real-time scanning in antivirus software?
What is the purpose of real-time scanning in antivirus software?A . To scan the system only during idle times.B . To monitor and detect threats as they occur.C . To analyze encrypted files for malware.D . To speed up the system’s processing time.View AnswerAnswer: B Explanation: Real-time scanning continuously monitors...
What is the first step in establishing a secure computing environment?
What is the first step in establishing a secure computing environment?A . Regular software updatesB . Identifying and classifying assetsC . Encrypting all dataD . Installing a firewallView AnswerAnswer: B Explanation: Identifying and classifying assets helps organizations understand what needs protection and prioritize security measures effectively.