Which of the following is an example of confidential information?

Which of the following is an example of confidential information?A . Publicly available informationB . Bug Bounty programsC . Public press releasesD . Personal identification numbers (PINs)View AnswerAnswer: D

February 8, 2025 No Comments READ MORE +

Which of the following is a private IPv4 address?

Which of the following is a private IPv4 address?A . 2001:0db8:85a3:0000:0000:8a2e:0370:7334B . AC:DE:48:00:11:22C . 172.16.0.1D . 66.23.15.63View AnswerAnswer: C

February 6, 2025 No Comments READ MORE +

What is the purpose of a rootkit?

What is the purpose of a rootkit?A . To increase network speedB . To encrypt data on a systemC . To detect and remove malwareD . To provide remote access to a systemView AnswerAnswer: D

February 5, 2025 No Comments READ MORE +

Which of the following terms refers to a process of evaluating a system's security posture?

Which of the following terms refers to a process of evaluating a system's security posture?A . Security AuditB . CVEC . Security assessmentsD . ISMSView AnswerAnswer: C

February 4, 2025 No Comments READ MORE +

Which of the following is an example of a hybrid encryption scheme?

Which of the following is an example of a hybrid encryption scheme?A . RSAB . HTTPSC . AESD . SHA-256View AnswerAnswer: B

February 2, 2025 No Comments READ MORE +

What is the purpose of an RFID tag?

What is the purpose of an RFID tag?A . To enable wireless communication between devicesB . To store and transfer data wirelesslyC . To connect devices to the internetD . To control network trafficView AnswerAnswer: B

January 30, 2025 No Comments READ MORE +

Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?

Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?A . HTTP cookiesB . User tracking softwareC . Script blockersD . Ad blockersView AnswerAnswer: C

January 30, 2025 No Comments READ MORE +

What is the darknet?

What is the darknet?A . A type of network that is used for illegal activitiesB . A type of network that is only accessible through TORC . A type of network that is not connected to the internetD . Cloud StorageView AnswerAnswer: B

January 30, 2025 No Comments READ MORE +

Which of the following concepts is related to the process of verifying a user's identity?

Which of the following concepts is related to the process of verifying a user's identity?A . AuthorizationB . Digital identityC . AuthenticationD . AccountingView AnswerAnswer: C

January 28, 2025 No Comments READ MORE +

What are email spam filters?

What are email spam filters?A . Filters used to block sensitive information sent via emailB . Filters used to block all incoming emailC . Filters used to block only unsolicited and unwanted emailD . Filters used to block all outgoing emailView AnswerAnswer: C

January 28, 2025 No Comments READ MORE +