31. What is a phishing attack?
a. An attack in which an attacker uses email or other forms of communication to trick people into providing sensitive information or performing an action that compromises security.
b. An attack in which an attacker physically steals data from a computer system.
c. An attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.
32. What is a man-in-the-middle (MITM) attack?
a. An attack in which an attacker intercepts communications between two parties in order to eavesdrop or modify the messages.
b. An attack in which an attacker physically steals data from a computer system.
c. An attack in which an attacker uses a software program to gain unauthorized access to a computer system.
d. None of the above.
33. What is decryption?
a. The process of converting ciphertext into plaintext to make data readable.
b. The process of converting plaintext into ciphertext to protect data from unauthorized access.
c. The process of copying data from one system to another.
d. None of the above.
34. What is a digital certificate?
a. A digital document that contains a public key and other identifying information and is used to verify the identity of a person or organization.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
35. What is a virtual private network (VPN)?
a. A secure connection between two or more devices over a public network, typically used to provide remote access to a private network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
36. What is two-factor authentication (2FA)?
a. A security process in which a user must provide two forms of identification, typically a password and a security token, in order to access a system or application.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
37. What is biometric authentication?
a. A security process that uses physical characteristics, such as fingerprints or facial recognition, to verify a user’s identity.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
38. What is a backup?
a. A copy of important data that can be used to restore the original data in the event of data loss or corruption.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
39. What is disaster recovery?
a. The process of restoring critical systems and data in the event of a major disaster, such as a fire or natural disaster.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
40. What is intrusion detection?
a. The process of monitoring a system or network for signs of unauthorized access or malicious activity.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.