Which are the main components of the CIA triad in security?

Which are the main components of the CIA triad in security?A . Authentication, Integrity, AvailabilityB . Confidentiality, Integrity, AvailabilityC . Confidentiality, Accessibility, AuthenticationD . Authorization, Authentication, AccessView AnswerAnswer: B Explanation: The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).

April 20, 2025 No Comments READ MORE +

Which of the following best reduces the risk of unauthorized data access?

Which of the following best reduces the risk of unauthorized data access?A . Implementing strong password policiesB . Regularly updating hardware devicesC . Limiting network bandwidthD . Performing frequent hardware auditsView AnswerAnswer: A Explanation: Strong password policies protect against unauthorized access by ensuring only authorized users can access sensitive systems.

April 19, 2025 No Comments READ MORE +

Which two actions enhance both confidentiality and availability?

Which two actions enhance both confidentiality and availability?A . Data encryption and failover systemsB . Role-based access controls and redundant backupsC . Regular data audits and physical securityD . Disaster recovery plans and hashing techniquesView AnswerAnswer: A, B Explanation: Encryption ensures confidentiality, while failover systems and backups maintain data availability...

April 16, 2025 No Comments READ MORE +

What is the first step in a robust data security strategy?

What is the first step in a robust data security strategy?A . Encrypting all sensitive filesB . Identifying and classifying sensitive dataC . Deploying a firewallD . Implementing multi-factor authenticationView AnswerAnswer: B Explanation: Identifying and classifying data helps prioritize protection for sensitive information and allocate resources effectively.

April 14, 2025 No Comments READ MORE +

What is the primary purpose of multi-factor authentication (MFA)?

What is the primary purpose of multi-factor authentication (MFA)?A . To reduce password reset requestsB . To enhance user convenienceC . To strengthen access security by requiring multiple verification methodsD . To eliminate the need for strong passwordsView AnswerAnswer: C Explanation: MFA adds layers of authentication, making it more difficult...

April 13, 2025 No Comments READ MORE +

What is the primary risk of not updating antivirus software regularly?

What is the primary risk of not updating antivirus software regularly?A . Slower system performance.B . Inability to detect new types of malware.C . Reduced file storage capacity.D . Increased encryption overhead.View AnswerAnswer: B Explanation: Outdated antivirus software lacks recognition of the latest malware signatures, leaving systems vulnerable to emerging...

April 13, 2025 No Comments READ MORE +

What loss does this represent?

An organization's online store becomes unavailable due to a cyberattack. What loss does this represent?A . Loss of integrityB . Loss of availabilityC . Loss of confidentialityD . Financial gainView AnswerAnswer: B Explanation: When an online store becomes unavailable, it is a loss of availability, affecting business operations and potentially...

April 11, 2025 No Comments READ MORE +

What is the purpose of access control in security?

What is the purpose of access control in security?A . To secure physical serversB . To restrict unauthorized access to data and systemsC . To create user accountsD . To prevent phishing emailsView AnswerAnswer: B Explanation: Access control mechanisms ensure only authorized users can access specific data and systems, protecting...

April 7, 2025 No Comments READ MORE +

Which security measure best prevents phishing attacks?

Which security measure best prevents phishing attacks?A . Regular employee awareness trainingB . Strong encryption algorithmsC . Redundant backups of sensitive dataD . Biometric access controlsView AnswerAnswer: A Explanation: Employee awareness training helps users identify and avoid phishing attempts, reducing the risk of compromised credentials.

April 7, 2025 No Comments READ MORE +

Which of the following is a step to prevent malware infections? (Choose two)

Which of the following is a step to prevent malware infections? (Choose two)A . Regularly update operating systems and software.B . Avoid using antivirus software to reduce system overhead.C . Open email attachments from unknown senders.D . Download software only from trusted sources.View AnswerAnswer: A, D Explanation: Keeping systems updated...

April 6, 2025 No Comments READ MORE +