Which attack is an example of compromising availability?

Which attack is an example of compromising availability?A . PhishingB . Denial-of-serviceC . Malware installationD . Credential theftView AnswerAnswer: B Explanation: Denial-of-service attacks compromise availability by overwhelming a system, making it inaccessible to authorized users.

March 24, 2025 No Comments READ MORE +

What is the best method to remove stubborn malware from a system?

What is the best method to remove stubborn malware from a system?A . Reinstalling the operating system.B . Running an antivirus scan in safe mode.C . Disabling internet connectivity.D . Restarting the system in normal mode.View AnswerAnswer: B Explanation: Running antivirus software in safe mode helps remove malware by preventing...

March 23, 2025 No Comments READ MORE +

Which type of malware is designed to track keyboard input?

Which type of malware is designed to track keyboard input?A . RansomwareB . KeyloggerC . WormD . Trojan horseView AnswerAnswer: B Explanation: Keyloggers record keystrokes to capture sensitive information, such as passwords and financial details.

March 21, 2025 No Comments READ MORE +

A ransomware attack primarily affects which security element?

A ransomware attack primarily affects which security element?A . ConfidentialityB . AvailabilityC . IntegrityD . ScalabilityView AnswerAnswer: B Explanation: Ransomware encrypts data and systems, preventing access until a ransom is paid, compromising availability.

March 20, 2025 No Comments READ MORE +

Which of the following is the primary characteristic of malware?

Which of the following is the primary characteristic of malware?A . Software designed to enhance system performance.B . Software intended to disrupt, damage, or gain unauthorized access.C . Software that prevents unauthorized access.D . Software that only affects outdated operating systems.View AnswerAnswer: B Explanation: Malware is malicious software specifically designed...

March 19, 2025 No Comments READ MORE +

Which of the following best describes data security?

Which of the following best describes data security?A . Measures to protect data from unauthorized access.B . The process of ensuring data is stored in physical locations only.C . Backup and recovery techniques for cloud data.D . Procedures to duplicate data across multiple locations.View AnswerAnswer: A Explanation: Data security encompasses...

March 19, 2025 No Comments READ MORE +

What is a key purpose of encryption in data security?

What is a key purpose of encryption in data security?A . To make data readily accessible.B . To ensure data is transmitted securely.C . To reduce the need for firewalls.D . To optimize system performance.View AnswerAnswer: B Explanation: Encryption protects data during transmission by converting it into unreadable formats, ensuring...

March 17, 2025 No Comments READ MORE +

What is a primary function of encryption in data security?

What is a primary function of encryption in data security?A . Improve system performance.B . Prevent unauthorized access to data.C . Enable seamless data sharing.D . Reduce storage requirements.View AnswerAnswer: B Explanation: Encryption converts data into unreadable formats, ensuring that only authorized users with decryption keys can access it.

March 15, 2025 No Comments READ MORE +

Which two factors contribute to the loss of confidentiality in a system?

Which two factors contribute to the loss of confidentiality in a system?A . Weak password policiesB . Data encryption during transmissionC . Lack of access controlsD . Hashing techniques for validationView AnswerAnswer: A, C Explanation: Weak passwords and insufficient access controls expose systems to unauthorized access, compromising confidentiality.

March 15, 2025 No Comments READ MORE +

Which two factors improve antivirus software efficiency?

Which two factors improve antivirus software efficiency?A . Frequent updates and real-time protectionB . Increased CPU performance and reduced scansC . Uninstalling unused software and firewallsD . Disabling non-essential system processesView AnswerAnswer: A Explanation: Regular updates and real-time protection keep antivirus software prepared for current threats and ensure constant monitoring.

March 14, 2025 No Comments READ MORE +