Which network security concept focuses on limiting network access based on user roles and responsibilities?
Which network security concept focuses on limiting network access based on user roles and responsibilities?A . Intrusion detectionB . Access controlC . Vulnerability scanningD . Network segmentationView AnswerAnswer: B Explanation: Access control is a network security concept that focuses on limiting network access based on user roles and responsibilities. It...
What is smishing?
What is smishing?A . A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information.B . A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person.C . A type of phishing attack...
Which malicious activity is NOT typically associated with cyber attacks?
Which malicious activity is NOT typically associated with cyber attacks?A . PhishingB . MalwareC . Data encryptionD . Denial of Service (DoS)View AnswerAnswer: C Explanation: Data encryption is a security measure used to protect data from unauthorized access. While encryption can be utilized by cyber attackers to make stolen data...
What is a common vulnerability in cloud-based systems?
What is a common vulnerability in cloud-based systems?A . Inadequate access controlsB . Outdated antivirus softwareC . Weak passwordsD . Lack of network segmentationView AnswerAnswer: A Explanation: Option 1: Correct: Inadequate access controls can leave cloud-based systems vulnerable to unauthorized access and data breaches. Option 2: Incorrect: Outdated antivirus software...
What term refers to the process of creating a virtual version of a device or resource, such as a server or a network?
What term refers to the process of creating a virtual version of a device or resource, such as a server or a network?A . VirtualizationB . DMZC . CloudD . ProxyView AnswerAnswer: A Explanation: Virtualization is the process of creating a virtual version of a device or resource, such as...
What is a vulnerability in the context of cybersecurity?
What is a vulnerability in the context of cybersecurity?A . An advanced encryption algorithmB . A software bug that causes system crashesC . A weakness in a system that can be exploited by threatsD . A security measure that prevents unauthorized accessView AnswerAnswer: C Explanation: A vulnerability refers to a...
Which of the following best describes the concept of data integrity in cybersecurity?
Which of the following best describes the concept of data integrity in cybersecurity?A . Ensuring data is available for authorized users when neededB . Encrypting data to prevent unauthorized modificationsC . Protecting data from unauthorized access or disclosureD . Ensuring data is accurate, consistent, and trustworthyView AnswerAnswer: D Explanation: Data...
What is the purpose of multi-factor authentication?
What is the purpose of multi-factor authentication?A . To provide multiple layers of security by requiring users to provide more than one form of identificationB . To simplify the login process by only requiring one form of identificationC . To restrict access to certain users by requiring additional authorizationD ....
Which notation is used by IPv6?
Which notation is used by IPv6?A . Decimal notationB . Octal notationC . Hexadecimal notationD . Binary notationView AnswerAnswer: C Explanation: IPv6 addresses are expressed using hexadecimal notation. It consists of eight groups of four hexadecimal digits separated by colons, e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334. Hexadecimal digits range from 0 to 9 and...
Which statement accurately describes the concept of a code of ethics in the cybersecurity field?
Which statement accurately describes the concept of a code of ethics in the cybersecurity field?A . A document that articulates ethical standards for cybersecurity professionals.B . A set of laws and regulations governing cybersecurity practices.C . A framework outlining the steps of a cybersecurity attack.D . A compilation of open-source...