Which are the key advantages of encryption? (Choose two)
Which are the key advantages of encryption? (Choose two)A . Protects data integrityB . Simplifies compliance requirementsC . Ensures data confidentialityD . Reduces the need for backupsView AnswerAnswer: A, C Explanation: Encryption protects data integrity by preventing unauthorized modifications and ensures confidentiality by restricting access to authorized parties.
Which two features are commonly found in antivirus software?
Which two features are commonly found in antivirus software?A . Real-time scanning and scheduled scansB . Data encryption and physical securityC . Intrusion detection and firewall settingsD . Multi-factor authentication and password managementView AnswerAnswer: A Explanation: Antivirus software often includes real-time scanning to detect threats as they occur and scheduled...
Why is regular patch management critical?
Why is regular patch management critical?A . To ensure hardware longevityB . To reduce downtime during updatesC . To fix known vulnerabilities and prevent exploitsD . To simplify system configurationsView AnswerAnswer: C Explanation: Regular patch management addresses known vulnerabilities, reducing the risk of attacks that exploit outdated software.
What is the primary objective of a vulnerability assessment?
What is the primary objective of a vulnerability assessment?A . Identify and prioritize system vulnerabilitiesB . Replace outdated softwareC . Implement disaster recovery plansD . Encrypt sensitive dataView AnswerAnswer: A Explanation: Vulnerability assessments identify and prioritize risks in a system, enabling proactive security measures to address potential threats.
What is the role of a quarantine feature in antivirus software?
What is the role of a quarantine feature in antivirus software?A . Deleting all detected malware files.B . Isolating suspicious files to prevent them from running.C . Backing up infected files for recovery.D . Encrypting files to protect them from malware.View AnswerAnswer: B Explanation: Quarantine isolates potentially harmful files, preventing...
What is the best practice for securing sensitive data stored in the cloud?
What is the best practice for securing sensitive data stored in the cloud?A . Storing it in unstructured formatsB . Using strong encryption methodsC . Avoiding access control mechanismsD . Reducing the number of backupsView AnswerAnswer: B Explanation: Encrypting sensitive data in the cloud ensures that even if unauthorized access...
Which of the following reduces the impact of insider threats?
Which of the following reduces the impact of insider threats?A . Encrypting data at rest.B . Implementing role-based access controls.C . Using redundant storage systems.D . Regularly updating antivirus software.View AnswerAnswer: B Explanation: Role-based access controls limit access to data based on job functions, minimizing opportunities for insider threats.
Which of the following ensures data availability?
Which of the following ensures data availability?A . Frequent data backups and redundancy measuresB . Strong passwords and encryption methodsC . Firewalls and intrusion detection systemsD . Regular software updatesView AnswerAnswer: A Explanation: Backups and redundancy ensure data availability by providing alternative ways to access data during system failures.
Which type of malware modifies its code to avoid detection?
Which type of malware modifies its code to avoid detection?A . Polymorphic malwareB . SpywareC . AdwareD . KeyloggerView AnswerAnswer: A Explanation: Polymorphic malware frequently changes its code structure, making it harder for antivirus programs to detect.
Which are the main components of the CIA triad in security?
Which are the main components of the CIA triad in security?A . Authentication, Integrity, AvailabilityB . Confidentiality, Integrity, AvailabilityC . Confidentiality, Accessibility, AuthenticationD . Authorization, Authentication, AccessView AnswerAnswer: B Explanation: The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).