Which are the main components of the CIA triad in security?
Which are the main components of the CIA triad in security?A . Authentication, Integrity, AvailabilityB . Confidentiality, Integrity, AvailabilityC . Confidentiality, Accessibility, AuthenticationD . Authorization, Authentication, AccessView AnswerAnswer: B Explanation: The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).
Which of the following best reduces the risk of unauthorized data access?
Which of the following best reduces the risk of unauthorized data access?A . Implementing strong password policiesB . Regularly updating hardware devicesC . Limiting network bandwidthD . Performing frequent hardware auditsView AnswerAnswer: A Explanation: Strong password policies protect against unauthorized access by ensuring only authorized users can access sensitive systems.
Which two actions enhance both confidentiality and availability?
Which two actions enhance both confidentiality and availability?A . Data encryption and failover systemsB . Role-based access controls and redundant backupsC . Regular data audits and physical securityD . Disaster recovery plans and hashing techniquesView AnswerAnswer: A, B Explanation: Encryption ensures confidentiality, while failover systems and backups maintain data availability...
What is the first step in a robust data security strategy?
What is the first step in a robust data security strategy?A . Encrypting all sensitive filesB . Identifying and classifying sensitive dataC . Deploying a firewallD . Implementing multi-factor authenticationView AnswerAnswer: B Explanation: Identifying and classifying data helps prioritize protection for sensitive information and allocate resources effectively.
What is the primary purpose of multi-factor authentication (MFA)?
What is the primary purpose of multi-factor authentication (MFA)?A . To reduce password reset requestsB . To enhance user convenienceC . To strengthen access security by requiring multiple verification methodsD . To eliminate the need for strong passwordsView AnswerAnswer: C Explanation: MFA adds layers of authentication, making it more difficult...
What is the primary risk of not updating antivirus software regularly?
What is the primary risk of not updating antivirus software regularly?A . Slower system performance.B . Inability to detect new types of malware.C . Reduced file storage capacity.D . Increased encryption overhead.View AnswerAnswer: B Explanation: Outdated antivirus software lacks recognition of the latest malware signatures, leaving systems vulnerable to emerging...
What loss does this represent?
An organization's online store becomes unavailable due to a cyberattack. What loss does this represent?A . Loss of integrityB . Loss of availabilityC . Loss of confidentialityD . Financial gainView AnswerAnswer: B Explanation: When an online store becomes unavailable, it is a loss of availability, affecting business operations and potentially...
What is the purpose of access control in security?
What is the purpose of access control in security?A . To secure physical serversB . To restrict unauthorized access to data and systemsC . To create user accountsD . To prevent phishing emailsView AnswerAnswer: B Explanation: Access control mechanisms ensure only authorized users can access specific data and systems, protecting...
Which security measure best prevents phishing attacks?
Which security measure best prevents phishing attacks?A . Regular employee awareness trainingB . Strong encryption algorithmsC . Redundant backups of sensitive dataD . Biometric access controlsView AnswerAnswer: A Explanation: Employee awareness training helps users identify and avoid phishing attempts, reducing the risk of compromised credentials.
Which of the following is a step to prevent malware infections? (Choose two)
Which of the following is a step to prevent malware infections? (Choose two)A . Regularly update operating systems and software.B . Avoid using antivirus software to reduce system overhead.C . Open email attachments from unknown senders.D . Download software only from trusted sources.View AnswerAnswer: A, D Explanation: Keeping systems updated...