Which security measure protects data in transit?
Which security measure protects data in transit?A . FirewallsB . Encryption protocolsC . Multi-factor authenticationD . Data backupsView AnswerAnswer: B Explanation: Encryption protocols safeguard data during transmission, preventing unauthorized access and maintaining confidentiality.
Which of the following are considered potential losses due to security attacks? (Choose two)
Which of the following are considered potential losses due to security attacks? (Choose two)A . Financial lossesB . Improved system performanceC . Loss of customer trustD . Reduction in data redundancyView AnswerAnswer: A, C Explanation: Security attacks can lead to financial losses and damage customer trust, affecting organizational reputation and...
Which type of malware records user activities without their consent?
Which type of malware records user activities without their consent?A . TrojansB . AdwareC . SpywareD . WormsView AnswerAnswer: C Explanation: Spyware collects and transmits user data, such as keystrokes and browsing activities, without the user’s knowledge.
Which type of data is typically most at risk during transit?
Which type of data is typically most at risk during transit?A . Encrypted dataB . Redundant backup filesC . Unencrypted sensitive dataD . Archived filesView AnswerAnswer: C Explanation: Unencrypted data in transit is vulnerable to interception, potentially compromising confidentiality and security.
What should be done after installing antivirus software?
What should be done after installing antivirus software?A . Disconnect the system from the internet.B . Update the software and run a full system scan.C . Disable real-time scanning to improve performance.D . Perform a factory reset on the system.View AnswerAnswer: B Explanation: Updating antivirus software ensures it recognizes the...
Which type of malware encrypts files and demands payment for access?
Which type of malware encrypts files and demands payment for access?A . SpywareB . RansomwareC . WormsD . AdwareView AnswerAnswer: B Explanation: Ransomware encrypts files, restricting access to them until a ransom is paid, targeting availability and causing significant disruptions.
Which are common potential losses from a data breach? (Choose two)
Which are common potential losses from a data breach? (Choose two)A . Financial penaltiesB . Enhanced system performanceC . Loss of customer trustD . Increased data redundancyView AnswerAnswer: A, C Explanation: Data breaches often lead to regulatory fines and loss of trust, severely impacting financial and reputational aspects.
A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?
A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?A . IntegrityB . ConfidentialityC . AvailabilityD . AuthenticationView AnswerAnswer: C Explanation: DDoS attacks overload systems, making services unavailable to legitimate users, directly impacting availability.
What is a potential impact of a successful social engineering attack?
What is a potential impact of a successful social engineering attack?A . Unauthorized data accessB . Network hardware failureC . System performance optimizationD . Improved compliance policiesView AnswerAnswer: A Explanation: Social engineering attacks trick individuals into revealing sensitive information, leading to unauthorized data access and breaches.
Which of the following are potential losses due to security attacks? (Choose two)
Which of the following are potential losses due to security attacks? (Choose two)A . Financial lossB . Reduced system performanceC . Increased regulatory oversightD . Damage to reputationView AnswerAnswer: A, D Explanation: Financial loss and damage to reputation are common outcomes of security breaches, affecting organizations severely.