Which of the following is NOT an essential security principle?

Which of the following is NOT an essential security principle?A . ComplexityB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: A Explanation: Complexity is not considered an essential security principle. The essential security principles are confidentiality, availability, and integrity. Confidentiality ensures that information is only accessible to authorized individuals or entities....

February 9, 2025 No Comments READ MORE +

Which of the following represents a technique used in Classless Inter-Domain Routing (CIDR)?

Which of the following represents a technique used in Classless Inter-Domain Routing (CIDR)?A . Variable-length subnet masksB . Compressed MAC addressesC . Binary notation for IP addressesD . 32-bit IP addressesView AnswerAnswer: A Explanation: Classless Inter-Domain Routing (CIDR) is a technique used to allocate and manage IP addresses more efficiently....

February 9, 2025 No Comments READ MORE +

What is malware?

What is malware?A . A form of cyber attack that attempts to gain unauthorized access to a network.B . A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system.C . A technique used by attackers to obtain sensitive information through deception.D . A...

February 7, 2025 No Comments READ MORE +

Which of the following is an example of a web application vulnerability that can be exploited by an attacker?

Which of the following is an example of a web application vulnerability that can be exploited by an attacker?A . Network latencyB . Disk fragmentationC . Buffer overflowD . Cross-site scripting (XSS)View AnswerAnswer: D Explanation: Cross-site scripting (XSS) is a web application vulnerability where an attacker injects malicious code into...

February 5, 2025 No Comments READ MORE +

Which of the following best describes social engineering?

Which of the following best describes social engineering?A . A method of manipulating individuals to disclose sensitive informationB . A type of malware attackC . A physical security controlD . A network security protocolView AnswerAnswer: A Explanation: Social engineering refers to the practice of manipulating and deceiving individuals into revealing...

February 4, 2025 No Comments READ MORE +

Which of the following access control methods is the most secure?

Which of the following access control methods is the most secure?A . Biometric authenticationB . Multi-factor authenticationC . Single-factor authenticationD . Password-based authenticationView AnswerAnswer: A Explanation: Biometric authentication is considered the most secure access control method because it relies on unique physical or behavioral characteristics of an individual, such as...

February 3, 2025 No Comments READ MORE +

What is the purpose of implementing a firewall in a network?

What is the purpose of implementing a firewall in a network?A . To scan and remove malware from network trafficB . To prevent unauthorized physical access to network devicesC . To control and filter network traffic based on predetermined security policiesD . To monitor network performance and troubleshoot issuesView AnswerAnswer:...

February 2, 2025 No Comments READ MORE +

Which of the following features help to secure a wireless SoHo network from unauthorized access?

Which of the following features help to secure a wireless SoHo network from unauthorized access?A . Default admin credentialsB . Weak encryptionC . MAC filteringD . SSID broadcastView AnswerAnswer: C Explanation: MAC filtering is a feature that allows a network administrator to specify which devices can connect to the wireless...

February 2, 2025 No Comments READ MORE +

Which of the following is a common threat to cybersecurity?

Which of the following is a common threat to cybersecurity?A . Software updatesB . Data encryptionC . User authenticationD . Phishing attacksView AnswerAnswer: D Explanation: Phishing attacks are a common threat to cybersecurity. They involve fraudulent attempts to obtain sensitive information, such as passwords and credit card details, by disguising...

January 29, 2025 No Comments READ MORE +

Which security feature provides network segmentation by creating virtual networks?

Which security feature provides network segmentation by creating virtual networks?A . VLANsB . VLANsC . Intrusion Prevention System (IPS)D . Virtual Private Network (VPN)View AnswerAnswer: A Explanation: Option 1: Correct, VLANs (Virtual Local Area Networks) provide network segmentation by creating virtual networks, allowing different groups of devices to be logically...

January 28, 2025 No Comments READ MORE +