What is a key benefit of using network segmentation?
What is a key benefit of using network segmentation?A . Improved system performanceB . Reduced impact of breaches on critical systemsC . Faster data backupsD . Enhanced physical securityView AnswerAnswer: B Explanation: Network segmentation limits the spread of attacks by isolating critical systems, reducing the overall impact of breaches.
What is a potential consequence of unpatched software vulnerabilities?
What is a potential consequence of unpatched software vulnerabilities?A . Reduced encryption strengthB . Unauthorized system access by attackersC . Improved system speedD . Increased network redundancyView AnswerAnswer: B Explanation: Unpatched software vulnerabilities are exploited by attackers to gain unauthorized access to systems and data.
What is the most effective way to prevent brute-force attacks on passwords?
What is the most effective way to prevent brute-force attacks on passwords?A . Use firewalls to block trafficB . Require strong password policies and lockout mechanismsC . Encrypt all password filesD . Implement biometric authenticationView AnswerAnswer: B Explanation: Strong password policies and account lockout mechanisms reduce the likelihood of brute-force...
Which term refers to an unauthorized entity gaining access to sensitive data?
Which term refers to an unauthorized entity gaining access to sensitive data?A . Data breachB . Data maskingC . Data redundancyD . Data auditView AnswerAnswer: A Explanation: A data breach occurs when unauthorized individuals access sensitive information, violating confidentiality.
What is the first step in the process of installing antivirus software?
What is the first step in the process of installing antivirus software?A . Running a full system scan.B . Checking the system for existing malware.C . Downloading the software from a trusted source.D . Updating the software definitions.View AnswerAnswer: C Explanation: The installation process begins with downloading antivirus software from...
What is the key characteristic of ransomware attacks?
What is the key characteristic of ransomware attacks?A . Encrypting data to restrict access until a ransom is paid.B . Infecting systems with malicious spyware.C . Overloading systems with fake traffic.D . Intercepting communication between devices.View AnswerAnswer: A Explanation: Ransomware encrypts files, denying users access to their data until a...
What is an example of a loss of integrity?
What is an example of a loss of integrity?A . Inaccessible systems due to a DDoS attackB . Tampered financial transaction recordsC . Exposure of encrypted dataD . Unauthorized file downloadsView AnswerAnswer: B Explanation: A loss of integrity occurs when information is altered without authorization, as in the case of...
Why is regular security training important?
Why is regular security training important?A . To avoid compliance penaltiesB . To keep employees informed about evolving threatsC . To reduce encryption overheadD . To maintain software licensing requirementsView AnswerAnswer: B Explanation: Regular training helps employees recognize and respond to evolving cybersecurity threats, improving overall security posture.
Which are the key advantages of encryption? (Choose two)
Which are the key advantages of encryption? (Choose two)A . Protects data integrityB . Simplifies compliance requirementsC . Ensures data confidentialityD . Reduces the need for backupsView AnswerAnswer: A, C Explanation: Encryption protects data integrity by preventing unauthorized modifications and ensures confidentiality by restricting access to authorized parties.
Which two features are commonly found in antivirus software?
Which two features are commonly found in antivirus software?A . Real-time scanning and scheduled scansB . Data encryption and physical securityC . Intrusion detection and firewall settingsD . Multi-factor authentication and password managementView AnswerAnswer: A Explanation: Antivirus software often includes real-time scanning to detect threats as they occur and scheduled...