Computer Security

WhatsApp Channel Join Now
Telegram Group Join Now

61. What is social engineering?
a. A type of attack in which an attacker manipulates human behavior to gain access to a computer system or network.
b. A type of computer virus.
c. A security feature that prevents unauthorized access to a computer system or network.
d. None of the above.

View Answer >

62. What is two-factor authentication?
a. A security process in which a user must provide two forms of authentication, typically a password and a unique code sent to a mobile device, to access a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

63. What is multi-factor authentication?
a. A security process in which a user must provide multiple forms of authentication, such as a password, a fingerprint, and a smart card, to access a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

64. What is access control?
a. The process of restricting access to a system or network to authorized users or processes.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

65. What is intrusion detection?
a. The process of monitoring a computer system or network for signs of unauthorized access or malicious activity.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

66. What is intrusion prevention?
a. The process of stopping unauthorized access or malicious activity before it can harm a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

67. What is a vulnerability scanner?
a. A type of software tool that is used to identify vulnerabilities in a computer system or network.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

68. What is penetration testing?
a. The process of testing a computer system or network for vulnerabilities by simulating an attack by a hacker.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

69. What is a security audit?
a. A comprehensive review of a computer system or network to identify security weaknesses and make recommendations for improvements.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >

70. What is a security policy?
a. A document that outlines the rules and procedures for protecting a computer system or network from unauthorized access or malicious activity.
b. A type of computer hardware.
c. A type of computer software that helps improve performance.
d. None of the above.

View Answer >


WhatsApp Channel Join Now
Telegram Group Join Now
                                                   

Leave a Comment

telegram Join Telegram
Join Now Join Now