Which technology is responsible for managing cryptographic keys, digital certificates, and providing other security-related services?
Which technology is responsible for managing cryptographic keys, digital certificates, and providing other security-related services?A . Intrusion Detection System (IDS)B . Virtual Private Network (VPN)C . Public Key Infrastructure (PKI)D . FirewallView AnswerAnswer: C Explanation: Public Key Infrastructure (PKI) is a framework of hardware, software, policies, and procedures used to...
What is an attack vector in cybersecurity?
What is an attack vector in cybersecurity?A . The method used by an attacker to gain unauthorized accessB . A vulnerability in a system that can be exploitedC . The path or means through which an attacker can exploit vulnerabilitiesD . The likelihood of a cyber attack taking placeView AnswerAnswer:...
Which of the following is a key advantage of multifactor authentication?
Which of the following is a key advantage of multifactor authentication?A . It allows for anonymous access to systems and resources.B . It simplifies the authentication process.C . It eliminates the need for strong passwords.D . It provides enhanced security by requiring multiple proofs of identity.View AnswerAnswer: D Explanation: Multifactor...
Which technology is responsible for monitoring network traffic and identifying potential threats?
Which technology is responsible for monitoring network traffic and identifying potential threats?A . IDSB . FirewallC . ServerD . IPSView AnswerAnswer: A Explanation: An Intrusion Detection System (IDS) is a technology that monitors network traffic and analyzes it for potential security breaches or vulnerabilities. It detects and alerts administrators to...
Which of the following is an example of a data security principle?
Which of the following is an example of a data security principle?A . Least PrivilegeB . Session ManagementC . ARP SpoofingD . CiphertextView AnswerAnswer: A Explanation: Option 1: Correct. Least Privilege is a data security principle that limits the access rights of individuals to only what is necessary for them...
Which of the following is a security best practice for securing data in the cloud?
Which of the following is a security best practice for securing data in the cloud?A . Storing sensitive data in clear textB . Implementing multi-factor authenticationC . Allowing unrestricted access to dataD . Using weak passwordsView AnswerAnswer: B Explanation: Option 1: Incorrect. Storing sensitive data in clear text is not...
What is a common security threat in which an attacker attempts to overwhelm a targeted system by flooding it with Internet traffic?
What is a common security threat in which an attacker attempts to overwhelm a targeted system by flooding it with Internet traffic?A . RansomwareB . Distributed Denial of Service (DDoS) attackC . PhishingD . SQL injectionView AnswerAnswer: B Explanation: Option 1: Ransomware is a type of malicious software that encrypts...
What is the purpose of encryption in network security?
What is the purpose of encryption in network security?A . To monitor and detect network attacksB . To authenticate and authorize usersC . To protect the confidentiality and integrity of data during transmissionD . To prevent unauthorized physical access to network devicesView AnswerAnswer: C Explanation: Encryption is the process of...
Which of the following is a network security device that operates at the session layer of the OSI model?
Which of the following is a network security device that operates at the session layer of the OSI model?A . FirewallB . Intrusion Detection System (IDS)C . Intrusion Prevention System (IPS)D . SSL/TLSView AnswerAnswer: B Explanation: Option 1: Incorrect. A firewall operates at the network layer (layer of the OSI...
Which cryptographic technique is used to ensure the integrity of data without the ability to reverse the process?
Which cryptographic technique is used to ensure the integrity of data without the ability to reverse the process?A . Hashing algorithmB . Digital signatureC . Asymmetric encryptionD . Symmetric encryptionView AnswerAnswer: A Explanation: Hashing is a cryptographic technique where an input (data/message) is processed through an algorithm to produce a...