What is a key benefit of using network segmentation?

What is a key benefit of using network segmentation?A . Improved system performanceB . Reduced impact of breaches on critical systemsC . Faster data backupsD . Enhanced physical securityView AnswerAnswer: B Explanation: Network segmentation limits the spread of attacks by isolating critical systems, reducing the overall impact of breaches.

May 3, 2025 No Comments READ MORE +

What is a potential consequence of unpatched software vulnerabilities?

What is a potential consequence of unpatched software vulnerabilities?A . Reduced encryption strengthB . Unauthorized system access by attackersC . Improved system speedD . Increased network redundancyView AnswerAnswer: B Explanation: Unpatched software vulnerabilities are exploited by attackers to gain unauthorized access to systems and data.

May 3, 2025 No Comments READ MORE +

What is the most effective way to prevent brute-force attacks on passwords?

What is the most effective way to prevent brute-force attacks on passwords?A . Use firewalls to block trafficB . Require strong password policies and lockout mechanismsC . Encrypt all password filesD . Implement biometric authenticationView AnswerAnswer: B Explanation: Strong password policies and account lockout mechanisms reduce the likelihood of brute-force...

May 3, 2025 No Comments READ MORE +

Which term refers to an unauthorized entity gaining access to sensitive data?

Which term refers to an unauthorized entity gaining access to sensitive data?A . Data breachB . Data maskingC . Data redundancyD . Data auditView AnswerAnswer: A Explanation: A data breach occurs when unauthorized individuals access sensitive information, violating confidentiality.

May 2, 2025 No Comments READ MORE +

What is the first step in the process of installing antivirus software?

What is the first step in the process of installing antivirus software?A . Running a full system scan.B . Checking the system for existing malware.C . Downloading the software from a trusted source.D . Updating the software definitions.View AnswerAnswer: C Explanation: The installation process begins with downloading antivirus software from...

May 2, 2025 No Comments READ MORE +

What is the key characteristic of ransomware attacks?

What is the key characteristic of ransomware attacks?A . Encrypting data to restrict access until a ransom is paid.B . Infecting systems with malicious spyware.C . Overloading systems with fake traffic.D . Intercepting communication between devices.View AnswerAnswer: A Explanation: Ransomware encrypts files, denying users access to their data until a...

April 29, 2025 No Comments READ MORE +

What is an example of a loss of integrity?

What is an example of a loss of integrity?A . Inaccessible systems due to a DDoS attackB . Tampered financial transaction recordsC . Exposure of encrypted dataD . Unauthorized file downloadsView AnswerAnswer: B Explanation: A loss of integrity occurs when information is altered without authorization, as in the case of...

April 29, 2025 No Comments READ MORE +

Why is regular security training important?

Why is regular security training important?A . To avoid compliance penaltiesB . To keep employees informed about evolving threatsC . To reduce encryption overheadD . To maintain software licensing requirementsView AnswerAnswer: B Explanation: Regular training helps employees recognize and respond to evolving cybersecurity threats, improving overall security posture.

April 28, 2025 No Comments READ MORE +

Which are the key advantages of encryption? (Choose two)

Which are the key advantages of encryption? (Choose two)A . Protects data integrityB . Simplifies compliance requirementsC . Ensures data confidentialityD . Reduces the need for backupsView AnswerAnswer: A, C Explanation: Encryption protects data integrity by preventing unauthorized modifications and ensures confidentiality by restricting access to authorized parties.

April 28, 2025 No Comments READ MORE +

Which two features are commonly found in antivirus software?

Which two features are commonly found in antivirus software?A . Real-time scanning and scheduled scansB . Data encryption and physical securityC . Intrusion detection and firewall settingsD . Multi-factor authentication and password managementView AnswerAnswer: A Explanation: Antivirus software often includes real-time scanning to detect threats as they occur and scheduled...

April 27, 2025 No Comments READ MORE +