a) A method of encrypting data b) An attack that allows an attacker to execute arbitrary SQL code on a database c) A type of malware d) A user authentication method
Correct Answer: b) An attack that allows an attacker to execute arbitrary SQL code on a database
Explanation: SQL injection exploits vulnerabilities in web applications that use SQL databases.
Question 42
What is “patch Tuesday”?
a) A method of user authentication b) The second Tuesday of each month when Microsoft releases security patches c) A type of malware d) A data backup solution
Correct Answer: b) The second Tuesday of each month when Microsoft releases security patches
Explanation: Patch Tuesday helps organizations keep their systems secure by providing regular updates.
Question 43
What does “physical security” refer to?
a) The practice of securing digital data b) Protecting physical assets from threats such as theft, vandalism, and natural disasters c) A type of malware d) A data backup solution
Correct Answer: b) Protecting physical assets from threats such as theft, vandalism, and natural disasters
Explanation: Physical security involves measures to safeguard buildings, equipment, and personnel.
Question 44
What is a “security breach”?
a) A successful attempt to exploit a vulnerability b) A method of data encryption c) A type of malware d) A data backup solution
Correct Answer: a) A successful attempt to exploit a vulnerability
Explanation: Security breaches can lead to unauthorized access to data and systems, causing harm to organizations.
Question 45
What does “data integrity” refer to?
a) The accuracy and consistency of data over its lifecycle b) A type of malware c) A method of data encryption d) A network monitoring tool
Correct Answer: a) The accuracy and consistency of data over its lifecycle
Explanation: Data integrity ensures that information is reliable and can be trusted.
Question 46
What is “authentication”?
a) The process of identifying users and granting access to systems b) A method of data encryption c) A type of malware d) A network monitoring tool
Correct Answer: a) The process of identifying users and granting access to systems
Explanation: Authentication verifies the identity of a user or system before allowing access.
Question 47
What is “encryption in transit”?
a) Encrypting data stored on disk b) Encrypting data while it is being transmitted over a network c) A type of malware d) A data backup solution
Correct Answer: b) Encrypting data while it is being transmitted over a network
Explanation: Encryption in transit protects data from interception during transmission.
Question 48
What does “malware prevention” involve?
a) Ensuring users are aware of safe computing practices b) Only using antivirus software c) Backing up data regularly d) A method of data encryption
Correct Answer: a) Ensuring users are aware of safe computing practices
Explanation: Malware prevention requires a combination of technical and human factors to effectively mitigate threats.
Question 49
What is “cybersecurity training”?
a) A method for encrypting data b) Educating employees about security policies and safe computing practices c) A type of malware d) A data backup solution
Correct Answer: b) Educating employees about security policies and safe computing practices
Explanation: Cybersecurity training helps reduce the risk of human error and improves overall security posture.
Question 50
What is “disaster recovery planning”?
a) A method of user authentication b) Developing a strategy for recovering from a disaster and restoring normal operations c) A type of malware d) A data backup solution
Correct Answer: b) Developing a strategy for recovering from a disaster and restoring normal operations
Explanation: Disaster recovery planning ensures that organizations can quickly recover from disruptive events.