Which of the following is a primary objective of data classification?

Which of the following is a primary objective of data classification?A . Enhance system performanceB . Reduce storage requirementsC . Prioritize security measures based on data sensitivityD . Enable universal data sharing across departmentsView AnswerAnswer: C Explanation: Data classification organizes information by sensitivity, helping to apply appropriate security controls and...

March 8, 2025 No Comments READ MORE +

Which type of attack often leads to identity theft?

Which type of attack often leads to identity theft?A . PhishingB . Man-in-the-middleC . Denial-of-serviceD . MalwareView AnswerAnswer: A Explanation: Phishing attacks trick users into revealing sensitive information, such as personal or financial data, leading to identity theft.

March 8, 2025 No Comments READ MORE +

What is the primary goal of confidentiality in the CIA triad?

What is the primary goal of confidentiality in the CIA triad?A . To restrict unauthorized access to sensitive data.B . To ensure all data is backed up.C . To protect systems from malware.D . To provide 24/7 access to systems.View AnswerAnswer: A Explanation: Confidentiality ensures only authorized individuals can access...

March 7, 2025 No Comments READ MORE +

Which attack method is specifically designed to compromise the availability of a system?

Which attack method is specifically designed to compromise the availability of a system?A . PhishingB . Denial-of-service (DoS)C . Man-in-the-middleD . RansomwareView AnswerAnswer: B Explanation: A DoS attack overwhelms system resources, making services unavailable to legitimate users and affecting availability.

March 6, 2025 No Comments READ MORE +

Which of the following best describes a zero-day attack?

Which of the following best describes a zero-day attack?A . Exploiting a known vulnerability without a patch.B . Attacking systems after a vulnerability is patched.C . Using outdated software for malicious purposes.D . Monitoring network traffic for suspicious activity.View AnswerAnswer: A Explanation: Zero-day attacks exploit software vulnerabilities that are unknown...

March 5, 2025 No Comments READ MORE +

How does adware affect a system?

How does adware affect a system?A . Encrypts system files until a ransom is paid.B . Displays unwanted advertisements, sometimes compromising privacy.C . Deletes critical system files.D . Modifies system settings to reduce performance.View AnswerAnswer: B Explanation: Adware generates unwanted advertisements and may collect user data to target personalized ads,...

March 4, 2025 No Comments READ MORE +

What is the role of authentication in data security?

What is the role of authentication in data security?A . To protect against phishing attacks.B . To verify the identity of users accessing a system.C . To enable encryption of sensitive data.D . To prevent hardware malfunctions.View AnswerAnswer: B Explanation: Authentication verifies users' identities, ensuring only authorized individuals can access...

March 2, 2025 No Comments READ MORE +

Which of these is an example of a technical control in data security?

Which of these is an example of a technical control in data security?A . Security policiesB . User awareness trainingC . FirewallsD . Incident response planningView AnswerAnswer: C Explanation: Technical controls like firewalls provide automated protection against threats, complementing procedural and administrative controls.

March 1, 2025 No Comments READ MORE +

What is the purpose of data masking in data security?

What is the purpose of data masking in data security?A . Encrypt data during transmission.B . Obscure sensitive data for non-production environments.C . Improve data availability in redundant systems.D . Facilitate faster data recovery.View AnswerAnswer: B Explanation: Data masking hides sensitive data by replacing it with fictitious values for use...

February 28, 2025 No Comments READ MORE +

Which two are common causes of data breaches?

Which two are common causes of data breaches?A . Poor password managementB . Hardware malfunctionsC . Social engineering attacksD . Lack of data backupsView AnswerAnswer: A, C Explanation: Weak passwords and social engineering attacks are major contributors to data breaches, often leading to unauthorized access.

February 26, 2025 No Comments READ MORE +