Which cryptographic technique is used to ensure the integrity of data without the ability to reverse the process?
Which cryptographic technique is used to ensure the integrity of data without the ability to reverse the process?A . Hashing algorithmB . Digital signatureC . Asymmetric encryptionD . Symmetric encryptionView AnswerAnswer: A Explanation: Hashing is a cryptographic technique where an input (data/message) is processed through an algorithm to produce a...
Which network security concept focuses on limiting network access based on user roles and responsibilities?
Which network security concept focuses on limiting network access based on user roles and responsibilities?A . Intrusion detectionB . Access controlC . Vulnerability scanningD . Network segmentationView AnswerAnswer: B Explanation: Access control is a network security concept that focuses on limiting network access based on user roles and responsibilities. It...
What is smishing?
What is smishing?A . A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.B . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.C . A type of phishing attack...
Which malicious activity is NOT typically associated with cyber attacks?
Which malicious activity is NOT typically associated with cyber attacks?A . PhishingB . MalwareC . Data encryptionD . Denial of Service (DoS)View AnswerAnswer: C Explanation: Data encryption is a security measure used to protect data from unauthorized access. While encryption can be utilized by cyber attackers to make stolen data...
What is a common vulnerability in cloud-based systems?
What is a common vulnerability in cloud-based systems?A . Inadequate access controlsB . Outdated antivirus softwareC . Weak passwordsD . Lack of network segmentationView AnswerAnswer: A Explanation: Option 1: Correct: Inadequate access controls can leave cloud-based systems vulnerable to unauthorized access and data breaches. Option 2: Incorrect: Outdated antivirus software...
What term refers to the process of creating a virtual version of a device or resource, such as a server or a network?
What term refers to the process of creating a virtual version of a device or resource, such as a server or a network?A . VirtualizationB . DMZC . CloudD . ProxyView AnswerAnswer: A Explanation: Virtualization is the process of creating a virtual version of a device or resource, such as...
What is a vulnerability in the context of cybersecurity?
What is a vulnerability in the context of cybersecurity?A . An advanced encryption algorithmB . A software bug that causes system crashesC . A weakness in a system that can be exploited by threatsD . A security measure that prevents unauthorized accessView AnswerAnswer: C Explanation: A vulnerability refers to a...
Which of the following best describes the concept of data integrity in cybersecurity?
Which of the following best describes the concept of data integrity in cybersecurity?A . Ensuring data is available for authorized users when neededB . Encrypting data to prevent unauthorized modificationsC . Protecting data from unauthorized access or disclosureD . Ensuring data is accurate, consistent, and trustworthyView AnswerAnswer: D Explanation: Data...
What is the purpose of multi-factor authentication?
What is the purpose of multi-factor authentication?A . To provide multiple layers of security by requiring users to provide more than one form of identificationB . To simplify the login process by only requiring one form of identificationC . To restrict access to certain users by requiring additional authorizationD ....
Which notation is used by IPv6?
Which notation is used by IPv6?A . Decimal notationB . Octal notationC . Hexadecimal notationD . Binary notationView AnswerAnswer: C Explanation: IPv6 addresses are expressed using hexadecimal notation. It consists of eight groups of four hexadecimal digits separated by colons, e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334. Hexadecimal digits range from 0 to 9 and...