What is information classification?
What is information classification?A . The process of deleting informationB . The process of encrypting informationC . The process of categorizing information based on its sensitivityD . The process of sharing information with othersView AnswerAnswer: C
Which of the following provides even stronger security through the use of Simultaneous Authentication of Equals (SAE) encryption?
Which of the following provides even stronger security through the use of Simultaneous Authentication of Equals (SAE) encryption?A . WPA3B . WPA2C . WEPD . WPAView AnswerAnswer: A
What is blockchain?
What is blockchain?A . Blockchain is a digital currency.B . Blockchain is a type of database management systemC . Blockchain is a proprietary software platform developed by a single company.D . A type of database that uses a network of nodes to store information in a decentralized mannerView AnswerAnswer: D
Which of the following is an example of confidential information?
Which of the following is an example of confidential information?A . Publicly available informationB . Bug Bounty programsC . Public press releasesD . Personal identification numbers (PINs)View AnswerAnswer: D
Which of the following is a private IPv4 address?
Which of the following is a private IPv4 address?A . 2001:0db8:85a3:0000:0000:8a2e:0370:7334B . AC:DE:48:00:11:22C . 172.16.0.1D . 66.23.15.63View AnswerAnswer: C
What is the purpose of a rootkit?
What is the purpose of a rootkit?A . To increase network speedB . To encrypt data on a systemC . To detect and remove malwareD . To provide remote access to a systemView AnswerAnswer: D
Which of the following terms refers to a process of evaluating a system's security posture?
Which of the following terms refers to a process of evaluating a system's security posture?A . Security AuditB . CVEC . Security assessmentsD . ISMSView AnswerAnswer: C
Which of the following is an example of a hybrid encryption scheme?
Which of the following is an example of a hybrid encryption scheme?A . RSAB . HTTPSC . AESD . SHA-256View AnswerAnswer: B
What is the purpose of an RFID tag?
What is the purpose of an RFID tag?A . To enable wireless communication between devicesB . To store and transfer data wirelesslyC . To connect devices to the internetD . To control network trafficView AnswerAnswer: B
Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?
Which tool can help protect your privacy by preventing user tracking through browser fingerprinting?A . HTTP cookiesB . User tracking softwareC . Script blockersD . Ad blockersView AnswerAnswer: C