Which of the following can result in data availability loss?
Which of the following can result in data availability loss?A . Unauthorized data encryption by attackersB . Accidental deletion of critical filesC . Prolonged hardware failureD . All of the aboveView AnswerAnswer: D Explanation: Data availability can be compromised by encryption attacks (e.g., ransomware), accidental deletions, or extended hardware failures.
What is the most effective way to mitigate risks associated with unpatched vulnerabilities?
What is the most effective way to mitigate risks associated with unpatched vulnerabilities?A . Encrypting sensitive data.B . Implementing a regular patch management process.C . Conducting monthly data audits.D . Limiting network bandwidth.View AnswerAnswer: B Explanation: Regularly applying patches addresses known vulnerabilities, reducing the risk of exploitation by attackers.
Which two measures can enhance both data integrity and availability?
Which two measures can enhance both data integrity and availability?A . Regular data backups and hash verificationB . Firewalls and intrusion detection systemsC . Biometric authentication and monitoringD . Security awareness training and disaster recovery plansView AnswerAnswer: A, D Explanation: Data backups and hash verification protect integrity, while disaster recovery...
Which two actions can protect the integrity of data?
Which two actions can protect the integrity of data?A . Implementing strong access controlsB . Performing regular data backupsC . Encrypting data during transmissionD . Using hashing techniques for data validationView AnswerAnswer: A, D Explanation: Access controls and hashing prevent unauthorized alterations and verify data accuracy, protecting its integrity.
What is the main purpose of antivirus software?
What is the main purpose of antivirus software?A . To enhance system performance.B . To prevent and remove malware infections.C . To encrypt sensitive data.D . To reduce the need for system backups.View AnswerAnswer: B Explanation: Antivirus software detects, prevents, and removes malware to protect systems from unauthorized threats.