61. What is social engineering?
a. A type of attack in which an attacker manipulates human behavior to gain access to a computer system or network.
b. A type of computer virus.
c. A security feature that prevents unauthorized access to a computer system or network.
d. None of the above.
62. What is two-factor authentication?
a. A security process in which a user must provide two forms of authentication, typically a password and a unique code sent to a mobile device, to access a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
63. What is multi-factor authentication?
a. A security process in which a user must provide multiple forms of authentication, such as a password, a fingerprint, and a smart card, to access a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
64. What is access control?
a. The process of restricting access to a system or network to authorized users or processes.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
65. What is intrusion detection?
a. The process of monitoring a computer system or network for signs of unauthorized access or malicious activity.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
66. What is intrusion prevention?
a. The process of stopping unauthorized access or malicious activity before it can harm a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
67. What is a vulnerability scanner?
a. A type of software tool that is used to identify vulnerabilities in a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
68. What is penetration testing?
a. The process of testing a computer system or network for vulnerabilities by simulating an attack by a hacker.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
69. What is a security audit?
a. A comprehensive review of a computer system or network to identify security weaknesses and make recommendations for improvements.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.
70. What is a security policy?
a. A document that outlines the rules and procedures for protecting a computer system or network from unauthorized access or malicious activity.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.