Which of the following describes the process of securing data by converting it into a format that cannot be read by unauthorized users?
A. Hashing B. Tokenization C. Encryption D. Firewalling
Correct Answer: C. Encryption
Explanation: Encryption secures data by converting it into unreadable code that can only be decrypted by authorized parties. Hashing, tokenization, and firewalling serve different purposes.
Question 42
Which of the following is used to ensure the availability of systems and data in the event of a disaster?
A. Data encryption B. Backup and recovery C. Tokenization D. Intrusion Prevention System
Correct Answer: B. Backup and recovery
Explanation: Backup and recovery ensure that data and systems are available after a disaster, allowing organizations to restore operations. Encryption, tokenization, and intrusion prevention systems provide different protections.
Question 43
Which of the following is a method used to protect against password-cracking attempts by adding random data to passwords before hashing?
A. Tokenization B. Salting C. Encryption D. Multi-factor authentication
Correct Answer: B. Salting
Explanation: Salting adds random data to passwords before hashing them, making it harder for attackers to crack them. Tokenization, encryption, and multi-factor authentication serve different purposes.
Question 44
Which of the following refers to the ability of a system to continue functioning even in the event of a component failure?
A. Availability B. Integrity C. Confidentiality D. Fault tolerance
Correct Answer: D. Fault tolerance
Explanation: Fault tolerance refers to a system's ability to continue functioning despite the failure of one or more components. Availability ensures access to data, integrity protects data accuracy, and confidentiality restricts access to authorized users.
Question 45
Which of the following types of malware is designed to appear as legitimate software but performs malicious activities?
A. Virus B. Worm C. Trojan D. Ransomware
Correct Answer: C. Trojan
Explanation: A Trojan appears as legitimate software but performs malicious activities in the background. Viruses, worms, and ransomware behave differently.
Question 46
Which of the following best describes an attack where the attacker attempts to exploit a software vulnerability that has not yet been patched?
A. Man-in-the-middle B. Brute-force C. SQL injection D. Zero-day
Correct Answer: D. Zero-day
Explanation: A zero-day attack exploits a software vulnerability that is not yet known or patched. The other attacks target different aspects of security.
Question 47
Which of the following protocols is used to encrypt communication over the internet?
A. FTP B. SSH C. HTTP D. SMTP
Correct Answer: B. SSH
Explanation: SSH (Secure Shell) is used to encrypt communication over the internet, providing a secure channel. FTP, HTTP, and SMTP are older or less secure protocols.
Question 48
Which of the following ensures that data is accessible to authorized users when needed?
A. Integrity B. Confidentiality C. Availability D. Encryption
Correct Answer: C. Availability
Explanation: Availability ensures that data is accessible to authorized users when needed. Integrity protects data accuracy, confidentiality restricts access, and encryption secures data.
Question 49
Which of the following is used to ensure that only authorized devices can connect to a wireless network?
A. VPN B. MAC filtering C. Tokenization D. Hashing
Correct Answer: B. MAC filtering
Explanation: MAC filtering ensures that only authorized devices, based on their MAC addresses, can connect to a wireless network. VPN, tokenization, and hashing are different methods.
Question 50
Which of the following is the main purpose of hashing?
A. To protect data during transmission B. To verify the integrity of data C. To encrypt data at rest D. To manage access control
Correct Answer: B. To verify the integrity of data
Explanation: Hashing is used to verify the integrity of data by producing a unique digital fingerprint. It is not used for encryption or access control.