What is the primary purpose of multi-factor authentication (MFA)?

What is the primary purpose of multi-factor authentication (MFA)?A . To reduce password reset requestsB . To enhance user convenienceC . To strengthen access security by requiring multiple verification methodsD . To eliminate the need for strong passwordsView AnswerAnswer: C Explanation: MFA adds layers of authentication, making it more difficult...

April 13, 2025 No Comments READ MORE +

What is the primary risk of not updating antivirus software regularly?

What is the primary risk of not updating antivirus software regularly?A . Slower system performance.B . Inability to detect new types of malware.C . Reduced file storage capacity.D . Increased encryption overhead.View AnswerAnswer: B Explanation: Outdated antivirus software lacks recognition of the latest malware signatures, leaving systems vulnerable to emerging...

April 13, 2025 No Comments READ MORE +

What loss does this represent?

An organization's online store becomes unavailable due to a cyberattack. What loss does this represent?A . Loss of integrityB . Loss of availabilityC . Loss of confidentialityD . Financial gainView AnswerAnswer: B Explanation: When an online store becomes unavailable, it is a loss of availability, affecting business operations and potentially...

April 11, 2025 No Comments READ MORE +

What is the purpose of access control in security?

What is the purpose of access control in security?A . To secure physical serversB . To restrict unauthorized access to data and systemsC . To create user accountsD . To prevent phishing emailsView AnswerAnswer: B Explanation: Access control mechanisms ensure only authorized users can access specific data and systems, protecting...

April 7, 2025 No Comments READ MORE +

Which security measure best prevents phishing attacks?

Which security measure best prevents phishing attacks?A . Regular employee awareness trainingB . Strong encryption algorithmsC . Redundant backups of sensitive dataD . Biometric access controlsView AnswerAnswer: A Explanation: Employee awareness training helps users identify and avoid phishing attempts, reducing the risk of compromised credentials.

April 7, 2025 No Comments READ MORE +

Which of the following is a step to prevent malware infections? (Choose two)

Which of the following is a step to prevent malware infections? (Choose two)A . Regularly update operating systems and software.B . Avoid using antivirus software to reduce system overhead.C . Open email attachments from unknown senders.D . Download software only from trusted sources.View AnswerAnswer: A, D Explanation: Keeping systems updated...

April 6, 2025 No Comments READ MORE +

What is a key characteristic of hashing in security?

What is a key characteristic of hashing in security?A . Converts data into unreadable encrypted formats.B . Verifies data integrity by detecting unauthorized changes.C . Ensures uninterrupted access to sensitive information.D . Enhances data redundancy for recovery purposes.View AnswerAnswer: B Explanation: Hashing generates unique values based on data input, allowing...

April 5, 2025 No Comments READ MORE +

What is the primary risk of unencrypted sensitive data?

What is the primary risk of unencrypted sensitive data?A . Increased storage costsB . Loss of data availabilityC . Exposure during unauthorized accessD . Longer processing timesView AnswerAnswer: C Explanation: Unencrypted sensitive data is vulnerable to exposure during unauthorized access, compromising confidentiality.

April 4, 2025 No Comments READ MORE +

What kind of attack involves overwhelming a server with traffic to make it unavailable?

What kind of attack involves overwhelming a server with traffic to make it unavailable?A . Phishing attackB . Denial-of-service attackC . Malware injectionD . Social engineering attackView AnswerAnswer: B Explanation: Denial-of-service attacks flood servers with excessive traffic, disrupting services and making systems inaccessible to legitimate users.

April 3, 2025 No Comments READ MORE +

Which of the following best describes a man-in-the-middle attack?

Which of the following best describes a man-in-the-middle attack?A . Exploiting software vulnerabilities to gain access.B . Intercepting and altering communications between two parties.C . Overloading systems with traffic to deny service.D . Distributing malware to gain system control.View AnswerAnswer: B Explanation: A man-in-the-middle attack intercepts and manipulates communications between...

April 3, 2025 No Comments READ MORE +