Which type of encryption protects data while it is being transmitted over a network?

Which type of encryption protects data while it is being transmitted over a network?A . Transport Layer Security (TLS)B . Asymmetric encryptionC . Symmetric encryptionD . Hash encryptionView AnswerAnswer: A Explanation: Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over a network. It ensures the confidentiality...

May 17, 2025 No Comments READ MORE +

Which of the following is a common security control measure used to protect applications from unauthorized access?

Which of the following is a common security control measure used to protect applications from unauthorized access?A . File compressionB . Biometric authenticationC . Hard disk formattingD . Data anonymizationView AnswerAnswer: B Explanation: Biometric authentication is a security control measure that uses physical or behavioral characteristics, such as fingerprint scanning...

May 14, 2025 No Comments READ MORE +

What type of encryption is used to secure data that is stored on a hard drive or other storage media?

What type of encryption is used to secure data that is stored on a hard drive or other storage media?A . File-based encryptionB . Hash encryptionC . Symmetric encryptionD . Public Key Infrastructure (PKI)View AnswerAnswer: C Explanation: Symmetric encryption is a type of encryption where the same key is used...

May 13, 2025 No Comments READ MORE +

What is the purpose of using an application firewall in a cybersecurity setup?

What is the purpose of using an application firewall in a cybersecurity setup?A . To encrypt network traffic between applicationsB . To perform vulnerability scanning of applicationsC . To increase the speed and performance of applicationsD . To block malicious incoming requests and attacks aimed at the applicationView AnswerAnswer: D...

May 10, 2025 No Comments READ MORE +

What is an Advanced Persistent Threat (APT)?

What is an Advanced Persistent Threat (APT)?A . A vulnerability in network communication protocols.B . A cyberattack that compromises multiple devices simultaneously.C . A sophisticated and targeted attack that aims to gain unauthorized access and maintain persistence over a long period.D . A type of malware that spreads rapidly through...

May 9, 2025 No Comments READ MORE +

Which of the following is a key requirement for conducting a security compliance audit?

Which of the following is a key requirement for conducting a security compliance audit?A . A comprehensive understanding of security compliance standards and regulationsB . A certified auditor with expertise in security complianceC . Compliance monitoring tools and systemsD . A detailed audit plan and checklistView AnswerAnswer: A Explanation: Option...

May 8, 2025 No Comments READ MORE +

Which of the following best describes network security?

Which of the following best describes network security?A . Ensuring high availability and performance of the networkB . Securing physical access to network devicesC . Protecting data from unauthorized access or modificationsD . Preventing network configuration errorsView AnswerAnswer: C Explanation: Network security is the practice of protecting data in a...

May 6, 2025 No Comments READ MORE +

What is the purpose of Security Information and Event Management (SIEM) systems?

What is the purpose of Security Information and Event Management (SIEM) systems?A . To analyze network traffic and detect potential security threats.B . To centrally collect, store, and analyze logs from various systems to detect and respond to security incidents.C . To encrypt sensitive data to protect it from unauthorized...

May 5, 2025 No Comments READ MORE +

What is a denial of service (DoS) attack?

What is a denial of service (DoS) attack?A . A technique used by attackers to obtain sensitive information through deception.B . A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system.C . A form of cyber attack that attempts to gain unauthorized access...

April 27, 2025 No Comments READ MORE +

Which of the following is a best practice for managing security policies and procedures?

Which of the following is a best practice for managing security policies and procedures?A . Implementing a regular review process for security policiesB . Relying solely on default security settingsC . Allowing users to create and manage their own security policiesD . Not documenting the security policies and proceduresView AnswerAnswer:...

April 27, 2025 No Comments READ MORE +