Which of the following best describes data security?

Which of the following best describes data security?A . Measures to protect data from unauthorized access.B . The process of ensuring data is stored in physical locations only.C . Backup and recovery techniques for cloud data.D . Procedures to duplicate data across multiple locations.View AnswerAnswer: A Explanation: Data security encompasses...

March 19, 2025 No Comments READ MORE +

What is a key purpose of encryption in data security?

What is a key purpose of encryption in data security?A . To make data readily accessible.B . To ensure data is transmitted securely.C . To reduce the need for firewalls.D . To optimize system performance.View AnswerAnswer: B Explanation: Encryption protects data during transmission by converting it into unreadable formats, ensuring...

March 17, 2025 No Comments READ MORE +

What is a primary function of encryption in data security?

What is a primary function of encryption in data security?A . Improve system performance.B . Prevent unauthorized access to data.C . Enable seamless data sharing.D . Reduce storage requirements.View AnswerAnswer: B Explanation: Encryption converts data into unreadable formats, ensuring that only authorized users with decryption keys can access it.

March 15, 2025 No Comments READ MORE +

Which two factors contribute to the loss of confidentiality in a system?

Which two factors contribute to the loss of confidentiality in a system?A . Weak password policiesB . Data encryption during transmissionC . Lack of access controlsD . Hashing techniques for validationView AnswerAnswer: A, C Explanation: Weak passwords and insufficient access controls expose systems to unauthorized access, compromising confidentiality.

March 15, 2025 No Comments READ MORE +

Which two factors improve antivirus software efficiency?

Which two factors improve antivirus software efficiency?A . Frequent updates and real-time protectionB . Increased CPU performance and reduced scansC . Uninstalling unused software and firewallsD . Disabling non-essential system processesView AnswerAnswer: A Explanation: Regular updates and real-time protection keep antivirus software prepared for current threats and ensure constant monitoring.

March 14, 2025 No Comments READ MORE +

What does the CIA triad aim to achieve?

What does the CIA triad aim to achieve?A . Regulatory complianceB . Comprehensive data securityC . Data processing efficiencyD . Encryption protocolsView AnswerAnswer: B Explanation: The CIA triad―confidentiality, integrity, and availability―forms the foundation of a comprehensive approach to protecting information assets.

March 14, 2025 No Comments READ MORE +

What is the primary purpose of access control?

What is the primary purpose of access control?A . Securing physical server locationsB . Ensuring users can view all organizational dataC . Limiting data access based on roles or permissionsD . Backing up sensitive informationView AnswerAnswer: C Explanation: Access control mechanisms limit access to data and resources, ensuring users only...

March 12, 2025 No Comments READ MORE +

What is the best way to minimize insider threats?

What is the best way to minimize insider threats?A . Monitor network traffic continuouslyB . Restrict employee access to only necessary dataC . Implement network segmentationD . Encrypt all communicationsView AnswerAnswer: B Explanation: Limiting data access to only what employees need for their roles reduces the potential for insider threats.

March 12, 2025 No Comments READ MORE +

Data breaches primarily threaten which aspect of the CIA triad?

Data breaches primarily threaten which aspect of the CIA triad?A . IntegrityB . ConfidentialityC . AvailabilityD . All of the aboveView AnswerAnswer: B Explanation: Data breaches most directly threaten confidentiality by exposing sensitive information to unauthorized parties.

March 12, 2025 No Comments READ MORE +

Which are potential impacts of a loss of confidentiality? (Choose two)

Which are potential impacts of a loss of confidentiality? (Choose two)A . Identity theftB . Data corruptionC . Financial lossesD . Service unavailabilityView AnswerAnswer: A, C Explanation: A confidentiality breach can lead to identity theft and financial losses, affecting individuals and organizations significantly.

March 11, 2025 No Comments READ MORE +