What is the primary purpose of multi-factor authentication (MFA)?
What is the primary purpose of multi-factor authentication (MFA)?A . To reduce password reset requestsB . To enhance user convenienceC . To strengthen access security by requiring multiple verification methodsD . To eliminate the need for strong passwordsView AnswerAnswer: C Explanation: MFA adds layers of authentication, making it more difficult...
What is the primary risk of not updating antivirus software regularly?
What is the primary risk of not updating antivirus software regularly?A . Slower system performance.B . Inability to detect new types of malware.C . Reduced file storage capacity.D . Increased encryption overhead.View AnswerAnswer: B Explanation: Outdated antivirus software lacks recognition of the latest malware signatures, leaving systems vulnerable to emerging...
What loss does this represent?
An organization's online store becomes unavailable due to a cyberattack. What loss does this represent?A . Loss of integrityB . Loss of availabilityC . Loss of confidentialityD . Financial gainView AnswerAnswer: B Explanation: When an online store becomes unavailable, it is a loss of availability, affecting business operations and potentially...
What is the purpose of access control in security?
What is the purpose of access control in security?A . To secure physical serversB . To restrict unauthorized access to data and systemsC . To create user accountsD . To prevent phishing emailsView AnswerAnswer: B Explanation: Access control mechanisms ensure only authorized users can access specific data and systems, protecting...
Which security measure best prevents phishing attacks?
Which security measure best prevents phishing attacks?A . Regular employee awareness trainingB . Strong encryption algorithmsC . Redundant backups of sensitive dataD . Biometric access controlsView AnswerAnswer: A Explanation: Employee awareness training helps users identify and avoid phishing attempts, reducing the risk of compromised credentials.
Which of the following is a step to prevent malware infections? (Choose two)
Which of the following is a step to prevent malware infections? (Choose two)A . Regularly update operating systems and software.B . Avoid using antivirus software to reduce system overhead.C . Open email attachments from unknown senders.D . Download software only from trusted sources.View AnswerAnswer: A, D Explanation: Keeping systems updated...
What is a key characteristic of hashing in security?
What is a key characteristic of hashing in security?A . Converts data into unreadable encrypted formats.B . Verifies data integrity by detecting unauthorized changes.C . Ensures uninterrupted access to sensitive information.D . Enhances data redundancy for recovery purposes.View AnswerAnswer: B Explanation: Hashing generates unique values based on data input, allowing...
What is the primary risk of unencrypted sensitive data?
What is the primary risk of unencrypted sensitive data?A . Increased storage costsB . Loss of data availabilityC . Exposure during unauthorized accessD . Longer processing timesView AnswerAnswer: C Explanation: Unencrypted sensitive data is vulnerable to exposure during unauthorized access, compromising confidentiality.
What kind of attack involves overwhelming a server with traffic to make it unavailable?
What kind of attack involves overwhelming a server with traffic to make it unavailable?A . Phishing attackB . Denial-of-service attackC . Malware injectionD . Social engineering attackView AnswerAnswer: B Explanation: Denial-of-service attacks flood servers with excessive traffic, disrupting services and making systems inaccessible to legitimate users.
Which of the following best describes a man-in-the-middle attack?
Which of the following best describes a man-in-the-middle attack?A . Exploiting software vulnerabilities to gain access.B . Intercepting and altering communications between two parties.C . Overloading systems with traffic to deny service.D . Distributing malware to gain system control.View AnswerAnswer: B Explanation: A man-in-the-middle attack intercepts and manipulates communications between...