What is the primary objective of a vulnerability assessment?
What is the primary objective of a vulnerability assessment?A . Identify and prioritize system vulnerabilitiesB . Replace outdated softwareC . Implement disaster recovery plansD . Encrypt sensitive dataView AnswerAnswer: A Explanation: Vulnerability assessments identify and prioritize risks in a system, enabling proactive security measures to address potential threats.
What is the role of a quarantine feature in antivirus software?
What is the role of a quarantine feature in antivirus software?A . Deleting all detected malware files.B . Isolating suspicious files to prevent them from running.C . Backing up infected files for recovery.D . Encrypting files to protect them from malware.View AnswerAnswer: B Explanation: Quarantine isolates potentially harmful files, preventing...
What is the best practice for securing sensitive data stored in the cloud?
What is the best practice for securing sensitive data stored in the cloud?A . Storing it in unstructured formatsB . Using strong encryption methodsC . Avoiding access control mechanismsD . Reducing the number of backupsView AnswerAnswer: B Explanation: Encrypting sensitive data in the cloud ensures that even if unauthorized access...
Which of the following reduces the impact of insider threats?
Which of the following reduces the impact of insider threats?A . Encrypting data at rest.B . Implementing role-based access controls.C . Using redundant storage systems.D . Regularly updating antivirus software.View AnswerAnswer: B Explanation: Role-based access controls limit access to data based on job functions, minimizing opportunities for insider threats.
Which of the following ensures data availability?
Which of the following ensures data availability?A . Frequent data backups and redundancy measuresB . Strong passwords and encryption methodsC . Firewalls and intrusion detection systemsD . Regular software updatesView AnswerAnswer: A Explanation: Backups and redundancy ensure data availability by providing alternative ways to access data during system failures.
Which type of malware modifies its code to avoid detection?
Which type of malware modifies its code to avoid detection?A . Polymorphic malwareB . SpywareC . AdwareD . KeyloggerView AnswerAnswer: A Explanation: Polymorphic malware frequently changes its code structure, making it harder for antivirus programs to detect.
Which are the main components of the CIA triad in security?
Which are the main components of the CIA triad in security?A . Authentication, Integrity, AvailabilityB . Confidentiality, Integrity, AvailabilityC . Confidentiality, Accessibility, AuthenticationD . Authorization, Authentication, AccessView AnswerAnswer: B Explanation: The CIA triad ensures information security through confidentiality (privacy), integrity (accuracy), and availability (accessibility).
Which of the following best reduces the risk of unauthorized data access?
Which of the following best reduces the risk of unauthorized data access?A . Implementing strong password policiesB . Regularly updating hardware devicesC . Limiting network bandwidthD . Performing frequent hardware auditsView AnswerAnswer: A Explanation: Strong password policies protect against unauthorized access by ensuring only authorized users can access sensitive systems.
Which two actions enhance both confidentiality and availability?
Which two actions enhance both confidentiality and availability?A . Data encryption and failover systemsB . Role-based access controls and redundant backupsC . Regular data audits and physical securityD . Disaster recovery plans and hashing techniquesView AnswerAnswer: A, B Explanation: Encryption ensures confidentiality, while failover systems and backups maintain data availability...
What is the first step in a robust data security strategy?
What is the first step in a robust data security strategy?A . Encrypting all sensitive filesB . Identifying and classifying sensitive dataC . Deploying a firewallD . Implementing multi-factor authenticationView AnswerAnswer: B Explanation: Identifying and classifying data helps prioritize protection for sensitive information and allocate resources effectively.