Which security measure protects data in transit?

Which security measure protects data in transit?A . FirewallsB . Encryption protocolsC . Multi-factor authenticationD . Data backupsView AnswerAnswer: B Explanation: Encryption protocols safeguard data during transmission, preventing unauthorized access and maintaining confidentiality.

February 19, 2025 No Comments READ MORE +

Which of the following are considered potential losses due to security attacks? (Choose two)

Which of the following are considered potential losses due to security attacks? (Choose two)A . Financial lossesB . Improved system performanceC . Loss of customer trustD . Reduction in data redundancyView AnswerAnswer: A, C Explanation: Security attacks can lead to financial losses and damage customer trust, affecting organizational reputation and...

February 18, 2025 No Comments READ MORE +

Which type of malware records user activities without their consent?

Which type of malware records user activities without their consent?A . TrojansB . AdwareC . SpywareD . WormsView AnswerAnswer: C Explanation: Spyware collects and transmits user data, such as keystrokes and browsing activities, without the user’s knowledge.

February 15, 2025 No Comments READ MORE +

Which type of data is typically most at risk during transit?

Which type of data is typically most at risk during transit?A . Encrypted dataB . Redundant backup filesC . Unencrypted sensitive dataD . Archived filesView AnswerAnswer: C Explanation: Unencrypted data in transit is vulnerable to interception, potentially compromising confidentiality and security.

February 14, 2025 No Comments READ MORE +

What should be done after installing antivirus software?

What should be done after installing antivirus software?A . Disconnect the system from the internet.B . Update the software and run a full system scan.C . Disable real-time scanning to improve performance.D . Perform a factory reset on the system.View AnswerAnswer: B Explanation: Updating antivirus software ensures it recognizes the...

February 14, 2025 No Comments READ MORE +

Which type of malware encrypts files and demands payment for access?

Which type of malware encrypts files and demands payment for access?A . SpywareB . RansomwareC . WormsD . AdwareView AnswerAnswer: B Explanation: Ransomware encrypts files, restricting access to them until a ransom is paid, targeting availability and causing significant disruptions.

February 12, 2025 No Comments READ MORE +

Which are common potential losses from a data breach? (Choose two)

Which are common potential losses from a data breach? (Choose two)A . Financial penaltiesB . Enhanced system performanceC . Loss of customer trustD . Increased data redundancyView AnswerAnswer: A, C Explanation: Data breaches often lead to regulatory fines and loss of trust, severely impacting financial and reputational aspects.

February 8, 2025 No Comments READ MORE +

A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?

A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?A . IntegrityB . ConfidentialityC . AvailabilityD . AuthenticationView AnswerAnswer: C Explanation: DDoS attacks overload systems, making services unavailable to legitimate users, directly impacting availability.

February 5, 2025 No Comments READ MORE +

What is a potential impact of a successful social engineering attack?

What is a potential impact of a successful social engineering attack?A . Unauthorized data accessB . Network hardware failureC . System performance optimizationD . Improved compliance policiesView AnswerAnswer: A Explanation: Social engineering attacks trick individuals into revealing sensitive information, leading to unauthorized data access and breaches.

February 5, 2025 No Comments READ MORE +

Which of the following are potential losses due to security attacks? (Choose two)

Which of the following are potential losses due to security attacks? (Choose two)A . Financial lossB . Reduced system performanceC . Increased regulatory oversightD . Damage to reputationView AnswerAnswer: A, D Explanation: Financial loss and damage to reputation are common outcomes of security breaches, affecting organizations severely.

February 4, 2025 No Comments READ MORE +