Computer Security

WhatsApp Channel Join Now
Telegram Group Join Now

41. What is intrusion prevention?
a. The process of blocking unauthorized access or malicious activity before it can affect a system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

42. What is penetration testing?
a. A type of security testing in which an attacker simulates an attack on a system or network to identify vulnerabilities.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

43. What is social engineering?
a. The use of deception to manipulate individuals into divulging sensitive information or performing an action that compromises security.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

44. What is the CIA triad?
a. Confidentiality, integrity, and availability, three fundamental principles of information security.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

45. What is access control?
a. Theprocess of restricting access to a system or network to authorized users or processes.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

46. What is a firewall?
a. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

47. What is encryption key management?
a. The process of generating, distributing, storing, and revoking encryption keys used to secure data.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

48. What is a honeypot?
a. A decoy system designed to lure attackers into revealing their methods or techniques.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

49. What is the principle of least privilege?
a. The practice of limiting access to only the resources necessary to perform a task or job function.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

50. What is computer security?
a. The protection of computer systems and networks from theft or damage to hardware, software, or electronic data.
b. The process of designing and implementing secure computer systems and networks.
c. The prevention of unauthorized access to computer systems and networks.
d. All of the above.

View Answer >


WhatsApp Channel Join Now
Telegram Group Join Now
                                                   

Leave a Comment

telegram Join Telegram
Join Now Join Now