Which backup rotation scheme uses a sequence of full, differential, and incremental backups to create a backup history?

Which backup rotation scheme uses a sequence of full, differential, and incremental backups to create a backup history?A . Tower of HanoiB . Grandfather-Father-SonC . 3-2-1 Backup RuleD . Monthly-Weekly-DailyView AnswerAnswer: B

March 4, 2025 No Comments READ MORE +

What is the purpose of the GDPR?

What is the purpose of the GDPR?A . To encourage the collection and sharing of personal data without restrictionB . To encourage the use of insecure data storage methodsC . The GDPR is a type of virus that infects computer systems and steals personal informationD . To protect personal information...

March 4, 2025 No Comments READ MORE +

What is the purpose of a Public Key Infrastructure (PKI)?

What is the purpose of a Public Key Infrastructure (PKI)?A . To manage private keysB . To manage digital certificates and public keysC . To manage user accountsD . To manage encryption algorithmsView AnswerAnswer: B

March 3, 2025 No Comments READ MORE +

What is email spam?

What is email spam?A . Sensitive information sent via emailB . Unsolicited and unwanted emailC . Emails from trusted sourcesD . Encrypted emailView AnswerAnswer: B

February 27, 2025 No Comments READ MORE +

Which of the following solutions would be the most appropriate for ensuring the privacy of your conversation?

You want to send a private message to a friend using an instant messaging app. Which of the following solutions would be the most appropriate for ensuring the privacy of your conversation?A . TORB . A proxy serverC . Transfer encryptionD . End-to-end encryptionView AnswerAnswer: D

February 26, 2025 No Comments READ MORE +

What is the most effective type of phishing for targeting key executives within an organization?

What is the most effective type of phishing for targeting key executives within an organization?A . SpearphishingB . WhalingC . VishingD . SmishingView AnswerAnswer: B

February 26, 2025 No Comments READ MORE +

Which of the following legal concepts is concerned with compensating someone for harm caused by a security breach?

Which of the following legal concepts is concerned with compensating someone for harm caused by a security breach?A . Public lawB . Copyright lawC . Financial compensation claimsD . LiabilityView AnswerAnswer: D

February 24, 2025 No Comments READ MORE +

Which cloud deployment model would be the best choice for them?

Dion Solutions, a large enterprise company, needs to deploy a new software application for their employees to use. They want to make sure that their employees have access to the latest version of the software and that it is easy to manage. Which cloud deployment model would be the best...

February 24, 2025 No Comments READ MORE +

Which of the following devices is an example of an IoT device?

Which of the following devices is an example of an IoT device?A . RouterB . SmartphoneC . Desktop computerD . PrinterView AnswerAnswer: B

February 22, 2025 No Comments READ MORE +

Which of the following fields in an X.509 certificate identifies the domain name of a website?

Which of the following fields in an X.509 certificate identifies the domain name of a website?A . IssuerB . SubjectC . ValidityD . subjectAltNameView AnswerAnswer: D

February 21, 2025 No Comments READ MORE +