Which are the key advantages of encryption? (Choose two)

Which are the key advantages of encryption? (Choose two)A . Protects data integrityB . Simplifies compliance requirementsC . Ensures data confidentialityD . Reduces the need for backupsView AnswerAnswer: A, C Explanation: Encryption protects data integrity by preventing unauthorized modifications and ensures confidentiality by restricting access to authorized parties.

April 28, 2025 No Comments READ MORE +

Which two features are commonly found in antivirus software?

Which two features are commonly found in antivirus software?A . Real-time scanning and scheduled scansB . Data encryption and physical securityC . Intrusion detection and firewall settingsD . Multi-factor authentication and password managementView AnswerAnswer: A Explanation: Antivirus software often includes real-time scanning to detect threats as they occur and scheduled...

April 27, 2025 No Comments READ MORE +

Why is regular patch management critical?

Why is regular patch management critical?A . To ensure hardware longevityB . To reduce downtime during updatesC . To fix known vulnerabilities and prevent exploitsD . To simplify system configurationsView AnswerAnswer: C Explanation: Regular patch management addresses known vulnerabilities, reducing the risk of attacks that exploit outdated software.

April 27, 2025 No Comments READ MORE +

What is the primary objective of a vulnerability assessment?

What is the primary objective of a vulnerability assessment?A . Identify and prioritize system vulnerabilitiesB . Replace outdated softwareC . Implement disaster recovery plansD . Encrypt sensitive dataView AnswerAnswer: A Explanation: Vulnerability assessments identify and prioritize risks in a system, enabling proactive security measures to address potential threats.

April 27, 2025 No Comments READ MORE +

What is the role of a quarantine feature in antivirus software?

What is the role of a quarantine feature in antivirus software?A . Deleting all detected malware files.B . Isolating suspicious files to prevent them from running.C . Backing up infected files for recovery.D . Encrypting files to protect them from malware.View AnswerAnswer: B Explanation: Quarantine isolates potentially harmful files, preventing...

April 25, 2025 No Comments READ MORE +

What is the best practice for securing sensitive data stored in the cloud?

What is the best practice for securing sensitive data stored in the cloud?A . Storing it in unstructured formatsB . Using strong encryption methodsC . Avoiding access control mechanismsD . Reducing the number of backupsView AnswerAnswer: B Explanation: Encrypting sensitive data in the cloud ensures that even if unauthorized access...

April 24, 2025 No Comments READ MORE +

Which of the following reduces the impact of insider threats?

Which of the following reduces the impact of insider threats?A . Encrypting data at rest.B . Implementing role-based access controls.C . Using redundant storage systems.D . Regularly updating antivirus software.View AnswerAnswer: B Explanation: Role-based access controls limit access to data based on job functions, minimizing opportunities for insider threats.

April 22, 2025 No Comments READ MORE +

Which of the following ensures data availability?

Which of the following ensures data availability?A . Frequent data backups and redundancy measuresB . Strong passwords and encryption methodsC . Firewalls and intrusion detection systemsD . Regular software updatesView AnswerAnswer: A Explanation: Backups and redundancy ensure data availability by providing alternative ways to access data during system failures.

April 22, 2025 No Comments READ MORE +

Which type of malware modifies its code to avoid detection?

Which type of malware modifies its code to avoid detection?A . Polymorphic malwareB . SpywareC . AdwareD . KeyloggerView AnswerAnswer: A Explanation: Polymorphic malware frequently changes its code structure, making it harder for antivirus programs to detect.

April 22, 2025 No Comments READ MORE +

Which are the main components of the CIA triad in security?

Which are the main components of the CIA triad in security?A . Authentication, Integrity, AvailabilityB . Confidentiality, Integrity, AvailabilityC . Confidentiality, Accessibility, AuthenticationD . Authorization, Authentication, AccessView AnswerAnswer: B Explanation: The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).

April 20, 2025 No Comments READ MORE +