Which of the following is an example of confidential information?
Which of the following is an example of confidential information?A . Publicly available informationB . Bug Bounty programsC . Public press releasesD . Personal identification numbers (PINs)View AnswerAnswer: D
Which of the following is a private IPv4 address?
Which of the following is a private IPv4 address?A . 2001:0db8:85a3:0000:0000:8a2e:0370:7334B . AC:DE:48:00:11:22C . 172.16.0.1D . 66.23.15.63View AnswerAnswer: C
What is the purpose of a rootkit?
What is the purpose of a rootkit?A . To increase network speedB . To encrypt data on a systemC . To detect and remove malwareD . To provide remote access to a systemView AnswerAnswer: D
Which of the following terms refers to a process of evaluating a system's security posture?
Which of the following terms refers to a process of evaluating a system's security posture?A . Security AuditB . CVEC . Security assessmentsD . ISMSView AnswerAnswer: C
Which of the following is an example of a hybrid encryption scheme?
Which of the following is an example of a hybrid encryption scheme?A . RSAB . HTTPSC . AESD . SHA-256View AnswerAnswer: B
What is the purpose of an RFID tag?
What is the purpose of an RFID tag?A . To enable wireless communication between devicesB . To store and transfer data wirelesslyC . To connect devices to the internetD . To control network trafficView AnswerAnswer: B
Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?
Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?A . HTTP cookiesB . User tracking softwareC . Script blockersD . Ad blockersView AnswerAnswer: C
What is the darknet?
What is the darknet?A . A type of network that is used for illegal activitiesB . A type of network that is only accessible through TORC . A type of network that is not connected to the internetD . Cloud StorageView AnswerAnswer: B
Which of the following concepts is related to the process of verifying a user's identity?
Which of the following concepts is related to the process of verifying a user's identity?A . AuthorizationB . Digital identityC . AuthenticationD . AccountingView AnswerAnswer: C
What are email spam filters?
What are email spam filters?A . Filters used to block sensitive information sent via emailB . Filters used to block all incoming emailC . Filters used to block only unsolicited and unwanted emailD . Filters used to block all outgoing emailView AnswerAnswer: C