Which attack is an example of compromising availability?
Which attack is an example of compromising availability?A . PhishingB . Denial-of-serviceC . Malware installationD . Credential theftView AnswerAnswer: B Explanation: Denial-of-service attacks compromise availability by overwhelming a system, making it inaccessible to authorized users.
What is the best method to remove stubborn malware from a system?
What is the best method to remove stubborn malware from a system?A . Reinstalling the operating system.B . Running an antivirus scan in safe mode.C . Disabling internet connectivity.D . Restarting the system in normal mode.View AnswerAnswer: B Explanation: Running antivirus software in safe mode helps remove malware by preventing...
Which type of malware is designed to track keyboard input?
Which type of malware is designed to track keyboard input?A . RansomwareB . KeyloggerC . WormD . Trojan horseView AnswerAnswer: B Explanation: Keyloggers record keystrokes to capture sensitive information, such as passwords and financial details.
A ransomware attack primarily affects which security element?
A ransomware attack primarily affects which security element?A . ConfidentialityB . AvailabilityC . IntegrityD . ScalabilityView AnswerAnswer: B Explanation: Ransomware encrypts data and systems, preventing access until a ransom is paid, compromising availability.
Which of the following is the primary characteristic of malware?
Which of the following is the primary characteristic of malware?A . Software designed to enhance system performance.B . Software intended to disrupt, damage, or gain unauthorized access.C . Software that prevents unauthorized access.D . Software that only affects outdated operating systems.View AnswerAnswer: B Explanation: Malware is malicious software specifically designed...
Which of the following best describes data security?
Which of the following best describes data security?A . Measures to protect data from unauthorized access.B . The process of ensuring data is stored in physical locations only.C . Backup and recovery techniques for cloud data.D . Procedures to duplicate data across multiple locations.View AnswerAnswer: A Explanation: Data security encompasses...
What is a key purpose of encryption in data security?
What is a key purpose of encryption in data security?A . To make data readily accessible.B . To ensure data is transmitted securely.C . To reduce the need for firewalls.D . To optimize system performance.View AnswerAnswer: B Explanation: Encryption protects data during transmission by converting it into unreadable formats, ensuring...
What is a primary function of encryption in data security?
What is a primary function of encryption in data security?A . Improve system performance.B . Prevent unauthorized access to data.C . Enable seamless data sharing.D . Reduce storage requirements.View AnswerAnswer: B Explanation: Encryption converts data into unreadable formats, ensuring that only authorized users with decryption keys can access it.
Which two factors contribute to the loss of confidentiality in a system?
Which two factors contribute to the loss of confidentiality in a system?A . Weak password policiesB . Data encryption during transmissionC . Lack of access controlsD . Hashing techniques for validationView AnswerAnswer: A, C Explanation: Weak passwords and insufficient access controls expose systems to unauthorized access, compromising confidentiality.
Which two factors improve antivirus software efficiency?
Which two factors improve antivirus software efficiency?A . Frequent updates and real-time protectionB . Increased CPU performance and reduced scansC . Uninstalling unused software and firewallsD . Disabling non-essential system processesView AnswerAnswer: A Explanation: Regular updates and real-time protection keep antivirus software prepared for current threats and ensure constant monitoring.