Which attack method is specifically designed to compromise the availability of a system?
Which attack method is specifically designed to compromise the availability of a system?A . PhishingB . Denial-of-service (DoS)C . Man-in-the-middleD . RansomwareView AnswerAnswer: B Explanation: A DoS attack overwhelms system resources, making services unavailable to legitimate users and affecting availability.
Which of the following best describes a zero-day attack?
Which of the following best describes a zero-day attack?A . Exploiting a known vulnerability without a patch.B . Attacking systems after a vulnerability is patched.C . Using outdated software for malicious purposes.D . Monitoring network traffic for suspicious activity.View AnswerAnswer: A Explanation: Zero-day attacks exploit software vulnerabilities that are unknown...
How does adware affect a system?
How does adware affect a system?A . Encrypts system files until a ransom is paid.B . Displays unwanted advertisements, sometimes compromising privacy.C . Deletes critical system files.D . Modifies system settings to reduce performance.View AnswerAnswer: B Explanation: Adware generates unwanted advertisements and may collect user data to target personalized ads,...
What is the role of authentication in data security?
What is the role of authentication in data security?A . To protect against phishing attacks.B . To verify the identity of users accessing a system.C . To enable encryption of sensitive data.D . To prevent hardware malfunctions.View AnswerAnswer: B Explanation: Authentication verifies users' identities, ensuring only authorized individuals can access...
Which of these is an example of a technical control in data security?
Which of these is an example of a technical control in data security?A . Security policiesB . User awareness trainingC . FirewallsD . Incident response planningView AnswerAnswer: C Explanation: Technical controls like firewalls provide automated protection against threats, complementing procedural and administrative controls.
What is the purpose of data masking in data security?
What is the purpose of data masking in data security?A . Encrypt data during transmission.B . Obscure sensitive data for non-production environments.C . Improve data availability in redundant systems.D . Facilitate faster data recovery.View AnswerAnswer: B Explanation: Data masking hides sensitive data by replacing it with fictitious values for use...
Which two are common causes of data breaches?
Which two are common causes of data breaches?A . Poor password managementB . Hardware malfunctionsC . Social engineering attacksD . Lack of data backupsView AnswerAnswer: A, C Explanation: Weak passwords and social engineering attacks are major contributors to data breaches, often leading to unauthorized access.
What is a key element of ensuring data integrity?
What is a key element of ensuring data integrity?A . Implementing strict access controlsB . Using hashing algorithms for data validationC . Encrypting data during transmissionD . Restricting physical access to serversView AnswerAnswer: B Explanation: Hashing algorithms verify data integrity by detecting unauthorized alterations, ensuring data remains accurate and unmodified.
What is the key benefit of multi-factor authentication (MFA)?
What is the key benefit of multi-factor authentication (MFA)?A . Simplifies password managementB . Enhances system performanceC . Increases security by requiring multiple credentialsD . Eliminates the need for strong passwordsView AnswerAnswer: C Explanation: MFA strengthens access security by requiring multiple forms of verification, making unauthorized access more difficult.
What is the role of intrusion detection systems (IDS) in security?
What is the role of intrusion detection systems (IDS) in security?A . Prevent unauthorized access.B . Detect and alert administrators of potential breaches.C . Encrypt sensitive communications.D . Enhance physical security measures.View AnswerAnswer: B Explanation: IDS monitors network traffic and system activity to identify and alert administrators of potential security...