Which security measure should you implement to help ensure data privacy?

You are tasked with securely storing backups of sensitive data in a cloud service. Which security measure should you implement to help ensure data privacy?A . Physical security measures for the cloud serverB . Encryption of backups before uploading to the cloud serviceC . Two-factor authentication for accessing backupsD ....

April 24, 2025 No Comments READ MORE +

Which of the following is an example of an administrative control?

Which of the following is an example of an administrative control?A . FirewallsB . Biometric scannersC . Password policiesD . Intrusion detection systemsView AnswerAnswer: C

April 22, 2025 No Comments READ MORE +

Which of the following is a key feature of BitLocker?

Which of the following is a key feature of BitLocker?A . Free and open-sourceB . Cross-platform supportC . Integrated with WindowsD . Encrypts only filesView AnswerAnswer: C

April 22, 2025 No Comments READ MORE +

Which of the following is a characteristic of a secure password?

Which of the following is a characteristic of a secure password?A . Short lengthB . No special charactersC . ComplexityD . Infrequent changesView AnswerAnswer: C

April 22, 2025 No Comments READ MORE +

Which of the following should you be particularly aware of when deploying the cloud storage solution?

As the IT administrator of a company, you are responsible for implementing a cloud storage solution. You need to consider the potential issues related to the use of cloud services, especially concerning data synchronization and accessibility. Which of the following should you be particularly aware of when deploying the cloud...

April 22, 2025 No Comments READ MORE +

What is a script blocker?

What is a script blocker?A . A browser extension that prevents pop-up windowsB . A browser extension that removes or blocks advertisementsC . A browser extension that blocks scripts from running on websitesD . A browser extension that helps users control and manage cookiesView AnswerAnswer: C

April 20, 2025 No Comments READ MORE +

Which of the following is a common source for security incident information and guidance?

Which of the following is a common source for security incident information and guidance?A . Computer Emergency Response Team (CERT)B . Security incident response planC . Risk assessment reportD . IT forensics reportView AnswerAnswer: A

April 16, 2025 No Comments READ MORE +

What type of malware is most likely responsible for these symptoms?

Your friend complains that they recently installed a new browser extension to help find online discounts. However, since installing it, they have been experiencing an excessive amount of pop-up ads and unrelated advertising banners on web pages. What type of malware is most likely responsible for these symptoms?A . Trojan...

April 14, 2025 No Comments READ MORE +

Which concept ensures that only the intended recipients can read a message?

Which concept ensures that only the intended recipients can read a message?A . End-to-end encryptionB . Transfer encryptionC . TORD . Proxy serversView AnswerAnswer: A

April 13, 2025 No Comments READ MORE +

What is an non-disclosure agreement (NDA)?

What is an non-disclosure agreement (NDA)?A . An agreement to not disclose any informationB . A contract that requires sharing confidential information with others in a business relationshipC . An agreement to disclose all informationD . An agreement to disclose some informationView AnswerAnswer: A

April 13, 2025 No Comments READ MORE +