Which of the following is a primary objective of data classification?
Which of the following is a primary objective of data classification?A . Enhance system performanceB . Reduce storage requirementsC . Prioritize security measures based on data sensitivityD . Enable universal data sharing across departmentsView AnswerAnswer: C Explanation: Data classification organizes information by sensitivity, helping to apply appropriate security controls and...
Which type of attack often leads to identity theft?
Which type of attack often leads to identity theft?A . PhishingB . Man-in-the-middleC . Denial-of-serviceD . MalwareView AnswerAnswer: A Explanation: Phishing attacks trick users into revealing sensitive information, such as personal or financial data, leading to identity theft.
What is the primary goal of confidentiality in the CIA triad?
What is the primary goal of confidentiality in the CIA triad?A . To restrict unauthorized access to sensitive data.B . To ensure all data is backed up.C . To protect systems from malware.D . To provide 24/7 access to systems.View AnswerAnswer: A Explanation: Confidentiality ensures only authorized individuals can access...
Which attack method is specifically designed to compromise the availability of a system?
Which attack method is specifically designed to compromise the availability of a system?A . PhishingB . Denial-of-service (DoS)C . Man-in-the-middleD . RansomwareView AnswerAnswer: B Explanation: A DoS attack overwhelms system resources, making services unavailable to legitimate users and affecting availability.
Which of the following best describes a zero-day attack?
Which of the following best describes a zero-day attack?A . Exploiting a known vulnerability without a patch.B . Attacking systems after a vulnerability is patched.C . Using outdated software for malicious purposes.D . Monitoring network traffic for suspicious activity.View AnswerAnswer: A Explanation: Zero-day attacks exploit software vulnerabilities that are unknown...
How does adware affect a system?
How does adware affect a system?A . Encrypts system files until a ransom is paid.B . Displays unwanted advertisements, sometimes compromising privacy.C . Deletes critical system files.D . Modifies system settings to reduce performance.View AnswerAnswer: B Explanation: Adware generates unwanted advertisements and may collect user data to target personalized ads,...
What is the role of authentication in data security?
What is the role of authentication in data security?A . To protect against phishing attacks.B . To verify the identity of users accessing a system.C . To enable encryption of sensitive data.D . To prevent hardware malfunctions.View AnswerAnswer: B Explanation: Authentication verifies users' identities, ensuring only authorized individuals can access...
Which of these is an example of a technical control in data security?
Which of these is an example of a technical control in data security?A . Security policiesB . User awareness trainingC . FirewallsD . Incident response planningView AnswerAnswer: C Explanation: Technical controls like firewalls provide automated protection against threats, complementing procedural and administrative controls.
What is the purpose of data masking in data security?
What is the purpose of data masking in data security?A . Encrypt data during transmission.B . Obscure sensitive data for non-production environments.C . Improve data availability in redundant systems.D . Facilitate faster data recovery.View AnswerAnswer: B Explanation: Data masking hides sensitive data by replacing it with fictitious values for use...
Which two are common causes of data breaches?
Which two are common causes of data breaches?A . Poor password managementB . Hardware malfunctionsC . Social engineering attacksD . Lack of data backupsView AnswerAnswer: A, C Explanation: Weak passwords and social engineering attacks are major contributors to data breaches, often leading to unauthorized access.