1. Which of the following best describes the concept of

"phishing" in the context of cybersecurity?

a) A technique used to gain unauthorized access to a

system through exploiting technological vulnerabilities.

b) A method of spreading malware by using social

engineering techniques via email or messaging.

c) The process of encrypting data to protect it from

unauthorized access.

d) A form of hacking that targets specific individuals or

organizations for financial gain.

Answer: b) A method of spreading malware by using social

engineering techniques via email or messaging.

Rationale: Phishing is a form of cyber attack where the

attacker disguises themselves as a trusted entity to trick

individuals into revealing sensitive information or

spreading malware through deceptive emails or messages.

2. Which of the following best describes the purpose of

multi-factor authentication (MFA)?

a) To ensure data is protected from unauthorized access

during transmission.

b) To verify the identity of users by requiring multiple

forms of authentication.

c) To secure physical access to sensitive areas in an

organization.

d) To encrypt data at rest to prevent unauthorized access.

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $27.00
Add To Cart

Buy Now
Category Exams and Certifications
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing