Which security practice involves regularly updating software to protect against known vulnerabilities?
A) Patching B) Data encryption C) Data masking D) Data backup
Correct Answer: A) Patching
Explanation: Patching involves applying updates to software to protect against known vulnerabilities and ensure that systems remain secure.
Question 42
What is the primary function of an ETL process in data management?
A) Encrypting sensitive data B) Extracting, transforming, and loading data into a database C) Backing up data for disaster recovery D) Deleting outdated or irrelevant data
Correct Answer: B) Extracting, transforming, and loading data into a database
Explanation: The ETL process involves extracting data from source systems, transforming it for analysis, and loading it into a target database.
Question 43
Which of the following describes an interpreted language?
A) The entire program is translated before execution B) Each line of code is translated and executed one at a time C) It runs faster than compiled languages D) It does not require a runtime environment
Correct Answer: B) Each line of code is translated and executed one at a time
Explanation: Interpreted languages translate and execute code one line at a time, making them flexible but often slower than compiled languages.
Question 44
Which of the following is considered a vulnerability in network security?
A) Strong encryption B) Open ports C) Two-factor authentication D) Encrypted backups
Correct Answer: B) Open ports
Explanation: Open ports can be a vulnerability in network security as they can be exploited by attackers to gain unauthorized access to a system.
Question 45
Which type of database model organizes data in tables with rows and columns, where each record is uniquely identified by a key?
A) Flat file B) Relational C) Hierarchical D) Object-oriented
Correct Answer: B) Relational
Explanation: A relational database model organizes data into tables with rows and columns, and each record is uniquely identified by a primary key.
Question 46
What does the acronym FTP stand for in networking?
A) File Transmission Protocol B) File Transfer Protocol C) Fast Transfer Process D) File Traffic Processing
Correct Answer: B) File Transfer Protocol
Explanation: FTP (File Transfer Protocol) is used to transfer files between computers over a network, enabling the exchange of data.
Question 47
Which type of attack involves injecting malicious code into an application through user input fields, often targeting databases?
A) Denial-of-service attack B) SQL injection C) Phishing attack D) Buffer overflow
Correct Answer: B) SQL injection
Explanation: SQL injection is an attack where malicious SQL code is inserted into an application’s input fields, targeting the database for unauthorized actions.
Question 48
Which data type refers to numbers that can contain decimals?
A) Integer B) Boolean C) String D) Floating-poin
Correct Answer: D) Floating-point
Explanation: Floating-point data types are used to represent numbers that can contain decimals, such as 3.14 or 0.001.
Question 49
What is the main purpose of a database management system (DBMS)?
A) To store large datasets across multiple systems B) To provide a framework for creating applications C) To manage and control access to databases D) To compile programs into machine code
Correct Answer: C) To manage and control access to databases
Explanation: A database management system (DBMS) manages and controls access to databases, ensuring data is stored, retrieved, and updated efficiently.
Question 50
Which cybersecurity attack involves eavesdropping on a network to capture unencrypted data in transit?
A) Phishing attack B) Packet sniffing C) SQL injection D) Man-in-the-middle attack
Correct Answer: B) Packet sniffing
Explanation: Packet sniffing is a type of cybersecurity attack where unencrypted data being transmitted over a network is intercepted by an attacker.