Which of the following is a plain text protocol?

Which of the following is a plain text protocol?A . SSLB . HTTPC . TLSD . HTTPSView AnswerAnswer: B

May 17, 2025 No Comments READ MORE +

Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?

Which of the following is a type of software that is embedded in hardware devices and provides instructions to the hardware to perform specific tasks?A . Desktop applicationsB . Server softwareC . FirmwareD . Web applicationsView AnswerAnswer: C

May 16, 2025 No Comments READ MORE +

Which of the following is a fraudulent Wi-Fi access point that appears to be legitimate and is used to eavesdrop on wireless communications?

Which of the following is a fraudulent Wi-Fi access point that appears to be legitimate and is used to eavesdrop on wireless communications?A . Captive portalB . De-authentication attackC . Karma attackD . Evil twinView AnswerAnswer: D

May 15, 2025 No Comments READ MORE +

Which of the following is a wired network connection commonly used for local area networks?

Which of the following is a wired network connection commonly used for local area networks?A . Twisted pairB . BluetoothC . Fiber opticD . CoaxialView AnswerAnswer: A

May 15, 2025 No Comments READ MORE +

What is one of the primary factors that determines data retention requirements for backups?

What is one of the primary factors that determines data retention requirements for backups?A . The cost implications of retaining backup data for extended periodsB . The sensitivity of the data being backed upC . The length of time an organization has been in operationD . Regulatory requirements and complianceView...

May 13, 2025 No Comments READ MORE +

What potential issue can arise from using some security tools that mistakenly identify legitimate activities as malicious?

What potential issue can arise from using some security tools that mistakenly identify legitimate activities as malicious?A . False positivesB . False negativesC . Improved detection accuracyD . Reduced system performance impactView AnswerAnswer: A

May 12, 2025 No Comments READ MORE +

What security measure should you take to protect your information?

You are using a public Wi-Fi network at a coffee shop to access sensitive information. What security measure should you take to protect your information?A . Use a weak password for your accountsB . Share your login credentials with others using the same Wi-Fi networkC . Leave your computer unattended...

May 10, 2025 No Comments READ MORE +

Which protocol is used to translate domain names into IP addresses?

Which protocol is used to translate domain names into IP addresses?A . DHCPB . SMTPC . 802.11D . DNSView AnswerAnswer: D

May 8, 2025 No Comments READ MORE +

What is Trusted Computing?

What is Trusted Computing?A . A protocol for secure communication between devicesB . A method for encrypting data on a physical mediumC . A security standard for IoT devicesD . A set of hardware and software technologies to enhance securityView AnswerAnswer: D

May 7, 2025 No Comments READ MORE +

What is the primary goal of an attacker who interrupts services, such as by launching a Distributed Denial of Service (DDoS) attack?

What is the primary goal of an attacker who interrupts services, such as by launching a Distributed Denial of Service (DDoS) attack?A . To manipulate or delete dataB . To extort ransom from the targeted organizationC . To cause a disruption in the availability of the targeted system or serviceD...

May 5, 2025 No Comments READ MORE +