{"id":96640,"date":"2025-02-19T03:14:42","date_gmt":"2025-02-19T03:14:42","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=96640"},"modified":"2025-02-19T03:14:42","modified_gmt":"2025-02-19T03:14:42","slug":"100-exact-112-12-dumps-v8-02-clearing-your-certified-secure-computer-user-cscu-exam-with-the-help-of-dumpsbase","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/100-exact-112-12-dumps-v8-02-clearing-your-certified-secure-computer-user-cscu-exam-with-the-help-of-dumpsbase.html","title":{"rendered":"100% Exact 112-12 Dumps (V8.02) &#8211; Clearing Your Certified Secure Computer User (CSCU) Exam with the Help of DumpsBase"},"content":{"rendered":"<p>Try 100% exact 112-12 dumps of DumpsBase now, we guarantee that you can clear your Certified Secure Computer User (CSCU) certification exam smoothly. Professionals choose to be a Certified Secure Computer User to demonstrate their knowledge and skills to protect their information assets. With this CSCU certification, they are introduced to various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, viruses and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks, and social engineering. The EC-Council CSCU 112-12 dumps allow you to get the very best likelihood to not just practice for the test however can also allow you to possess the right possibility to know the true exam. The current version of 112-12 dumps is V8.02, containing 480 practice exam questions and answers, which are easily accessible anywhere in our PDF format. DumpsBase 112-12 dumps PDF has been regarded as a dependable source for the preparation as they provide a 100% passing guarantee inside the 112-12 exam on the very first attempt.<\/p>\n<h2>EC-Council Certified Secure Computer User (CSCU) <em><span style=\"background-color: #00ffff;\">112-12 Free Dumps<\/span><\/em><\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam9434\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-9434\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-9434\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-377173'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Which of the following best describes data security?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='377173' \/><input type='hidden' id='answerType377173' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377173[]' id='answer-id-1468080' class='answer   answerof-377173 ' value='1468080'   \/><label for='answer-id-1468080' id='answer-label-1468080' class=' answer'><span>Measures to protect data from unauthorized access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377173[]' id='answer-id-1468081' class='answer   answerof-377173 ' value='1468081'   \/><label for='answer-id-1468081' id='answer-label-1468081' class=' answer'><span>The process of ensuring data is stored in physical locations only.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377173[]' id='answer-id-1468082' class='answer   answerof-377173 ' value='1468082'   \/><label for='answer-id-1468082' id='answer-label-1468082' class=' answer'><span>Backup and recovery techniques for cloud data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377173[]' id='answer-id-1468083' class='answer   answerof-377173 ' value='1468083'   \/><label for='answer-id-1468083' id='answer-label-1468083' class=' answer'><span>Procedures to duplicate data across multiple locations.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-377174'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which is NOT a core element of security?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='377174' \/><input type='hidden' id='answerType377174' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377174[]' id='answer-id-1468084' class='answer   answerof-377174 ' value='1468084'   \/><label for='answer-id-1468084' id='answer-label-1468084' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377174[]' id='answer-id-1468085' class='answer   answerof-377174 ' value='1468085'   \/><label for='answer-id-1468085' id='answer-label-1468085' class=' answer'><span>Data auditing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377174[]' id='answer-id-1468086' class='answer   answerof-377174 ' value='1468086'   \/><label for='answer-id-1468086' id='answer-label-1468086' class=' answer'><span>Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377174[]' id='answer-id-1468087' class='answer   answerof-377174 ' value='1468087'   \/><label for='answer-id-1468087' id='answer-label-1468087' class=' answer'><span>Availability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-377175'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>What does the CIA triad aim to achieve?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='377175' \/><input type='hidden' id='answerType377175' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377175[]' id='answer-id-1468088' class='answer   answerof-377175 ' value='1468088'   \/><label for='answer-id-1468088' id='answer-label-1468088' class=' answer'><span>Regulatory compliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377175[]' id='answer-id-1468089' class='answer   answerof-377175 ' value='1468089'   \/><label for='answer-id-1468089' id='answer-label-1468089' class=' answer'><span>Comprehensive data security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377175[]' id='answer-id-1468090' class='answer   answerof-377175 ' value='1468090'   \/><label for='answer-id-1468090' id='answer-label-1468090' class=' answer'><span>Data processing efficiency<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377175[]' id='answer-id-1468091' class='answer   answerof-377175 ' value='1468091'   \/><label for='answer-id-1468091' id='answer-label-1468091' class=' answer'><span>Encryption protocols<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-377176'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Data breaches primarily threaten which aspect of the CIA triad?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='377176' \/><input type='hidden' id='answerType377176' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377176[]' id='answer-id-1468092' class='answer   answerof-377176 ' value='1468092'   \/><label for='answer-id-1468092' id='answer-label-1468092' class=' answer'><span>Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377176[]' id='answer-id-1468093' class='answer   answerof-377176 ' value='1468093'   \/><label for='answer-id-1468093' id='answer-label-1468093' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377176[]' id='answer-id-1468094' class='answer   answerof-377176 ' value='1468094'   \/><label for='answer-id-1468094' id='answer-label-1468094' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377176[]' id='answer-id-1468095' class='answer   answerof-377176 ' value='1468095'   \/><label for='answer-id-1468095' id='answer-label-1468095' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-377177'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Which of the following can compromise data integrity? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_5' value='377177' \/><input type='hidden' id='answerType377177' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377177[]' id='answer-id-1468096' class='answer   answerof-377177 ' value='1468096'   \/><label for='answer-id-1468096' id='answer-label-1468096' class=' answer'><span>Unauthorized modifications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377177[]' id='answer-id-1468097' class='answer   answerof-377177 ' value='1468097'   \/><label for='answer-id-1468097' id='answer-label-1468097' class=' answer'><span>Man-in-the-middle attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377177[]' id='answer-id-1468098' class='answer   answerof-377177 ' value='1468098'   \/><label for='answer-id-1468098' id='answer-label-1468098' class=' answer'><span>User authentication failures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377177[]' id='answer-id-1468099' class='answer   answerof-377177 ' value='1468099'   \/><label for='answer-id-1468099' id='answer-label-1468099' class=' answer'><span>Distributed denial-of-service attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-377178'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>What is the first step in establishing a secure computing environment?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='377178' \/><input type='hidden' id='answerType377178' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377178[]' id='answer-id-1468100' class='answer   answerof-377178 ' value='1468100'   \/><label for='answer-id-1468100' id='answer-label-1468100' class=' answer'><span>Regular software updates<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377178[]' id='answer-id-1468101' class='answer   answerof-377178 ' value='1468101'   \/><label for='answer-id-1468101' id='answer-label-1468101' class=' answer'><span>Identifying and classifying assets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377178[]' id='answer-id-1468102' class='answer   answerof-377178 ' value='1468102'   \/><label for='answer-id-1468102' id='answer-label-1468102' class=' answer'><span>Encrypting all data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377178[]' id='answer-id-1468103' class='answer   answerof-377178 ' value='1468103'   \/><label for='answer-id-1468103' id='answer-label-1468103' class=' answer'><span>Installing a firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-377179'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Which type of security loss occurs due to a ransomware attack?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='377179' \/><input type='hidden' id='answerType377179' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377179[]' id='answer-id-1468104' class='answer   answerof-377179 ' value='1468104'   \/><label for='answer-id-1468104' id='answer-label-1468104' class=' answer'><span>Loss of availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377179[]' id='answer-id-1468105' class='answer   answerof-377179 ' value='1468105'   \/><label for='answer-id-1468105' id='answer-label-1468105' class=' answer'><span>Loss of confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377179[]' id='answer-id-1468106' class='answer   answerof-377179 ' value='1468106'   \/><label for='answer-id-1468106' id='answer-label-1468106' class=' answer'><span>Loss of integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377179[]' id='answer-id-1468107' class='answer   answerof-377179 ' value='1468107'   \/><label for='answer-id-1468107' id='answer-label-1468107' class=' answer'><span>Regulatory penalties<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-377180'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>An insider threat can compromise which elements of the CIA triad?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='377180' \/><input type='hidden' id='answerType377180' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377180[]' id='answer-id-1468108' class='answer   answerof-377180 ' value='1468108'   \/><label for='answer-id-1468108' id='answer-label-1468108' class=' answer'><span>Confidentiality only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377180[]' id='answer-id-1468109' class='answer   answerof-377180 ' value='1468109'   \/><label for='answer-id-1468109' id='answer-label-1468109' class=' answer'><span>Integrity and availability only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377180[]' id='answer-id-1468110' class='answer   answerof-377180 ' value='1468110'   \/><label for='answer-id-1468110' id='answer-label-1468110' class=' answer'><span>Confidentiality, integrity, and availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377180[]' id='answer-id-1468111' class='answer   answerof-377180 ' value='1468111'   \/><label for='answer-id-1468111' id='answer-label-1468111' class=' answer'><span>None of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-377181'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>What is the primary risk of unencrypted sensitive data?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='377181' \/><input type='hidden' id='answerType377181' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377181[]' id='answer-id-1468112' class='answer   answerof-377181 ' value='1468112'   \/><label for='answer-id-1468112' id='answer-label-1468112' class=' answer'><span>Increased storage costs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377181[]' id='answer-id-1468113' class='answer   answerof-377181 ' value='1468113'   \/><label for='answer-id-1468113' id='answer-label-1468113' class=' answer'><span>Loss of data availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377181[]' id='answer-id-1468114' class='answer   answerof-377181 ' value='1468114'   \/><label for='answer-id-1468114' id='answer-label-1468114' class=' answer'><span>Exposure during unauthorized access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377181[]' id='answer-id-1468115' class='answer   answerof-377181 ' value='1468115'   \/><label for='answer-id-1468115' id='answer-label-1468115' class=' answer'><span>Longer processing times<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-377182'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which of the following are potential losses due to security attacks? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_10' value='377182' \/><input type='hidden' id='answerType377182' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377182[]' id='answer-id-1468116' class='answer   answerof-377182 ' value='1468116'   \/><label for='answer-id-1468116' id='answer-label-1468116' class=' answer'><span>Financial loss<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377182[]' id='answer-id-1468117' class='answer   answerof-377182 ' value='1468117'   \/><label for='answer-id-1468117' id='answer-label-1468117' class=' answer'><span>Reduced system performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377182[]' id='answer-id-1468118' class='answer   answerof-377182 ' value='1468118'   \/><label for='answer-id-1468118' id='answer-label-1468118' class=' answer'><span>Increased regulatory oversight<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377182[]' id='answer-id-1468119' class='answer   answerof-377182 ' value='1468119'   \/><label for='answer-id-1468119' id='answer-label-1468119' class=' answer'><span>Damage to reputation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-377183'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>What is an example of a loss of integrity?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='377183' \/><input type='hidden' id='answerType377183' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377183[]' id='answer-id-1468120' class='answer   answerof-377183 ' value='1468120'   \/><label for='answer-id-1468120' id='answer-label-1468120' class=' answer'><span>Inaccessible systems due to a DDoS attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377183[]' id='answer-id-1468121' class='answer   answerof-377183 ' value='1468121'   \/><label for='answer-id-1468121' id='answer-label-1468121' class=' answer'><span>Tampered financial transaction records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377183[]' id='answer-id-1468122' class='answer   answerof-377183 ' value='1468122'   \/><label for='answer-id-1468122' id='answer-label-1468122' class=' answer'><span>Exposure of encrypted data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377183[]' id='answer-id-1468123' class='answer   answerof-377183 ' value='1468123'   \/><label for='answer-id-1468123' id='answer-label-1468123' class=' answer'><span>Unauthorized file downloads<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-377184'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Which attack is an example of compromising availability?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='377184' \/><input type='hidden' id='answerType377184' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377184[]' id='answer-id-1468124' class='answer   answerof-377184 ' value='1468124'   \/><label for='answer-id-1468124' id='answer-label-1468124' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377184[]' id='answer-id-1468125' class='answer   answerof-377184 ' value='1468125'   \/><label for='answer-id-1468125' id='answer-label-1468125' class=' answer'><span>Denial-of-service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377184[]' id='answer-id-1468126' class='answer   answerof-377184 ' value='1468126'   \/><label for='answer-id-1468126' id='answer-label-1468126' class=' answer'><span>Malware installation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377184[]' id='answer-id-1468127' class='answer   answerof-377184 ' value='1468127'   \/><label for='answer-id-1468127' id='answer-label-1468127' class=' answer'><span>Credential theft<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-377185'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>What is the goal of a security policy?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='377185' \/><input type='hidden' id='answerType377185' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377185[]' id='answer-id-1468128' class='answer   answerof-377185 ' value='1468128'   \/><label for='answer-id-1468128' id='answer-label-1468128' class=' answer'><span>To enforce organizational structure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377185[]' id='answer-id-1468129' class='answer   answerof-377185 ' value='1468129'   \/><label for='answer-id-1468129' id='answer-label-1468129' class=' answer'><span>To outline measures for protecting assets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377185[]' id='answer-id-1468130' class='answer   answerof-377185 ' value='1468130'   \/><label for='answer-id-1468130' id='answer-label-1468130' class=' answer'><span>To identify potential attackers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377185[]' id='answer-id-1468131' class='answer   answerof-377185 ' value='1468131'   \/><label for='answer-id-1468131' id='answer-label-1468131' class=' answer'><span>To ensure software usability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-377186'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which of the following is a characteristic of effective data encryption?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='377186' \/><input type='hidden' id='answerType377186' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377186[]' id='answer-id-1468132' class='answer   answerof-377186 ' value='1468132'   \/><label for='answer-id-1468132' id='answer-label-1468132' class=' answer'><span>Publicly available encryption keys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377186[]' id='answer-id-1468133' class='answer   answerof-377186 ' value='1468133'   \/><label for='answer-id-1468133' id='answer-label-1468133' class=' answer'><span>Limited application to sensitive data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377186[]' id='answer-id-1468134' class='answer   answerof-377186 ' value='1468134'   \/><label for='answer-id-1468134' id='answer-label-1468134' class=' answer'><span>Protection against unauthorized access during transmission<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377186[]' id='answer-id-1468135' class='answer   answerof-377186 ' value='1468135'   \/><label for='answer-id-1468135' id='answer-label-1468135' class=' answer'><span>Reduced performance of network systems<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-377187'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Why is regular security training important?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='377187' \/><input type='hidden' id='answerType377187' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377187[]' id='answer-id-1468136' class='answer   answerof-377187 ' value='1468136'   \/><label for='answer-id-1468136' id='answer-label-1468136' class=' answer'><span>To avoid compliance penalties<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377187[]' id='answer-id-1468137' class='answer   answerof-377187 ' value='1468137'   \/><label for='answer-id-1468137' id='answer-label-1468137' class=' answer'><span>To keep employees informed about evolving threats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377187[]' id='answer-id-1468138' class='answer   answerof-377187 ' value='1468138'   \/><label for='answer-id-1468138' id='answer-label-1468138' class=' answer'><span>To reduce encryption overhead<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377187[]' id='answer-id-1468139' class='answer   answerof-377187 ' value='1468139'   \/><label for='answer-id-1468139' id='answer-label-1468139' class=' answer'><span>To maintain software licensing requirements<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-377188'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Which component is essential for mitigating phishing attacks?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='377188' \/><input type='hidden' id='answerType377188' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377188[]' id='answer-id-1468140' class='answer   answerof-377188 ' value='1468140'   \/><label for='answer-id-1468140' id='answer-label-1468140' class=' answer'><span>Spam filters<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377188[]' id='answer-id-1468141' class='answer   answerof-377188 ' value='1468141'   \/><label for='answer-id-1468141' id='answer-label-1468141' class=' answer'><span>Advanced encryption methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377188[]' id='answer-id-1468142' class='answer   answerof-377188 ' value='1468142'   \/><label for='answer-id-1468142' id='answer-label-1468142' class=' answer'><span>Physical security measures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377188[]' id='answer-id-1468143' class='answer   answerof-377188 ' value='1468143'   \/><label for='answer-id-1468143' id='answer-label-1468143' class=' answer'><span>Hardware-based firewalls<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-377189'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>What is the primary purpose of access control?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='377189' \/><input type='hidden' id='answerType377189' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377189[]' id='answer-id-1468144' class='answer   answerof-377189 ' value='1468144'   \/><label for='answer-id-1468144' id='answer-label-1468144' class=' answer'><span>Securing physical server locations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377189[]' id='answer-id-1468145' class='answer   answerof-377189 ' value='1468145'   \/><label for='answer-id-1468145' id='answer-label-1468145' class=' answer'><span>Ensuring users can view all organizational data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377189[]' id='answer-id-1468146' class='answer   answerof-377189 ' value='1468146'   \/><label for='answer-id-1468146' id='answer-label-1468146' class=' answer'><span>Limiting data access based on roles or permissions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377189[]' id='answer-id-1468147' class='answer   answerof-377189 ' value='1468147'   \/><label for='answer-id-1468147' id='answer-label-1468147' class=' answer'><span>Backing up sensitive information<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-377190'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>An organization's online store becomes unavailable due to a cyberattack. <br \/>\r<br>What loss does this represent?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='377190' \/><input type='hidden' id='answerType377190' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377190[]' id='answer-id-1468148' class='answer   answerof-377190 ' value='1468148'   \/><label for='answer-id-1468148' id='answer-label-1468148' class=' answer'><span>Loss of integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377190[]' id='answer-id-1468149' class='answer   answerof-377190 ' value='1468149'   \/><label for='answer-id-1468149' id='answer-label-1468149' class=' answer'><span>Loss of availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377190[]' id='answer-id-1468150' class='answer   answerof-377190 ' value='1468150'   \/><label for='answer-id-1468150' id='answer-label-1468150' class=' answer'><span>Loss of confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377190[]' id='answer-id-1468151' class='answer   answerof-377190 ' value='1468151'   \/><label for='answer-id-1468151' id='answer-label-1468151' class=' answer'><span>Financial gain<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-377191'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which of the following best reduces the risk of unauthorized data access?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='377191' \/><input type='hidden' id='answerType377191' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377191[]' id='answer-id-1468152' class='answer   answerof-377191 ' value='1468152'   \/><label for='answer-id-1468152' id='answer-label-1468152' class=' answer'><span>Implementing strong password policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377191[]' id='answer-id-1468153' class='answer   answerof-377191 ' value='1468153'   \/><label for='answer-id-1468153' id='answer-label-1468153' class=' answer'><span>Regularly updating hardware devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377191[]' id='answer-id-1468154' class='answer   answerof-377191 ' value='1468154'   \/><label for='answer-id-1468154' id='answer-label-1468154' class=' answer'><span>Limiting network bandwidth<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377191[]' id='answer-id-1468155' class='answer   answerof-377191 ' value='1468155'   \/><label for='answer-id-1468155' id='answer-label-1468155' class=' answer'><span>Performing frequent hardware audits<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-377192'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which two security measures address both confidentiality and integrity?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='377192' \/><input type='hidden' id='answerType377192' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377192[]' id='answer-id-1468156' class='answer   answerof-377192 ' value='1468156'   \/><label for='answer-id-1468156' id='answer-label-1468156' class=' answer'><span>Access control and encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377192[]' id='answer-id-1468157' class='answer   answerof-377192 ' value='1468157'   \/><label for='answer-id-1468157' id='answer-label-1468157' class=' answer'><span>Multi-factor authentication and redundancy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377192[]' id='answer-id-1468158' class='answer   answerof-377192 ' value='1468158'   \/><label for='answer-id-1468158' id='answer-label-1468158' class=' answer'><span>Firewall implementation and monitoring<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377192[]' id='answer-id-1468159' class='answer   answerof-377192 ' value='1468159'   \/><label for='answer-id-1468159' id='answer-label-1468159' class=' answer'><span>Backups and disaster recovery plans<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-377193'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Which of the following is a primary objective of data classification?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='377193' \/><input type='hidden' id='answerType377193' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377193[]' id='answer-id-1468160' class='answer   answerof-377193 ' value='1468160'   \/><label for='answer-id-1468160' id='answer-label-1468160' class=' answer'><span>Enhance system performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377193[]' id='answer-id-1468161' class='answer   answerof-377193 ' value='1468161'   \/><label for='answer-id-1468161' id='answer-label-1468161' class=' answer'><span>Reduce storage requirements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377193[]' id='answer-id-1468162' class='answer   answerof-377193 ' value='1468162'   \/><label for='answer-id-1468162' id='answer-label-1468162' class=' answer'><span>Prioritize security measures based on data sensitivity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377193[]' id='answer-id-1468163' class='answer   answerof-377193 ' value='1468163'   \/><label for='answer-id-1468163' id='answer-label-1468163' class=' answer'><span>Enable universal data sharing across departments<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-377194'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>What is a potential impact of a successful social engineering attack?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='377194' \/><input type='hidden' id='answerType377194' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377194[]' id='answer-id-1468164' class='answer   answerof-377194 ' value='1468164'   \/><label for='answer-id-1468164' id='answer-label-1468164' class=' answer'><span>Unauthorized data access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377194[]' id='answer-id-1468165' class='answer   answerof-377194 ' value='1468165'   \/><label for='answer-id-1468165' id='answer-label-1468165' class=' answer'><span>Network hardware failure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377194[]' id='answer-id-1468166' class='answer   answerof-377194 ' value='1468166'   \/><label for='answer-id-1468166' id='answer-label-1468166' class=' answer'><span>System performance optimization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377194[]' id='answer-id-1468167' class='answer   answerof-377194 ' value='1468167'   \/><label for='answer-id-1468167' id='answer-label-1468167' class=' answer'><span>Improved compliance policies<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-377195'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Which type of data is typically most at risk during transit?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='377195' \/><input type='hidden' id='answerType377195' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377195[]' id='answer-id-1468168' class='answer   answerof-377195 ' value='1468168'   \/><label for='answer-id-1468168' id='answer-label-1468168' class=' answer'><span>Encrypted data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377195[]' id='answer-id-1468169' class='answer   answerof-377195 ' value='1468169'   \/><label for='answer-id-1468169' id='answer-label-1468169' class=' answer'><span>Redundant backup files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377195[]' id='answer-id-1468170' class='answer   answerof-377195 ' value='1468170'   \/><label for='answer-id-1468170' id='answer-label-1468170' class=' answer'><span>Unencrypted sensitive data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377195[]' id='answer-id-1468171' class='answer   answerof-377195 ' value='1468171'   \/><label for='answer-id-1468171' id='answer-label-1468171' class=' answer'><span>Archived files<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-377196'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which of these is an example of a technical control in data security?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='377196' \/><input type='hidden' id='answerType377196' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377196[]' id='answer-id-1468172' class='answer   answerof-377196 ' value='1468172'   \/><label for='answer-id-1468172' id='answer-label-1468172' class=' answer'><span>Security policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377196[]' id='answer-id-1468173' class='answer   answerof-377196 ' value='1468173'   \/><label for='answer-id-1468173' id='answer-label-1468173' class=' answer'><span>User awareness training<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377196[]' id='answer-id-1468174' class='answer   answerof-377196 ' value='1468174'   \/><label for='answer-id-1468174' id='answer-label-1468174' class=' answer'><span>Firewalls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377196[]' id='answer-id-1468175' class='answer   answerof-377196 ' value='1468175'   \/><label for='answer-id-1468175' id='answer-label-1468175' class=' answer'><span>Incident response planning<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-377197'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>What is the primary purpose of multi-factor authentication (MFA)?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='377197' \/><input type='hidden' id='answerType377197' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377197[]' id='answer-id-1468176' class='answer   answerof-377197 ' value='1468176'   \/><label for='answer-id-1468176' id='answer-label-1468176' class=' answer'><span>To reduce password reset requests<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377197[]' id='answer-id-1468177' class='answer   answerof-377197 ' value='1468177'   \/><label for='answer-id-1468177' id='answer-label-1468177' class=' answer'><span>To enhance user convenience<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377197[]' id='answer-id-1468178' class='answer   answerof-377197 ' value='1468178'   \/><label for='answer-id-1468178' id='answer-label-1468178' class=' answer'><span>To strengthen access security by requiring multiple verification methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377197[]' id='answer-id-1468179' class='answer   answerof-377197 ' value='1468179'   \/><label for='answer-id-1468179' id='answer-label-1468179' class=' answer'><span>To eliminate the need for strong passwords<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-377198'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which are the key advantages of encryption? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_26' value='377198' \/><input type='hidden' id='answerType377198' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377198[]' id='answer-id-1468180' class='answer   answerof-377198 ' value='1468180'   \/><label for='answer-id-1468180' id='answer-label-1468180' class=' answer'><span>Protects data integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377198[]' id='answer-id-1468181' class='answer   answerof-377198 ' value='1468181'   \/><label for='answer-id-1468181' id='answer-label-1468181' class=' answer'><span>Simplifies compliance requirements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377198[]' id='answer-id-1468182' class='answer   answerof-377198 ' value='1468182'   \/><label for='answer-id-1468182' id='answer-label-1468182' class=' answer'><span>Ensures data confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377198[]' id='answer-id-1468183' class='answer   answerof-377198 ' value='1468183'   \/><label for='answer-id-1468183' id='answer-label-1468183' class=' answer'><span>Reduces the need for backups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-377199'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which of the following can result in data availability loss?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='377199' \/><input type='hidden' id='answerType377199' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377199[]' id='answer-id-1468184' class='answer   answerof-377199 ' value='1468184'   \/><label for='answer-id-1468184' id='answer-label-1468184' class=' answer'><span>Unauthorized data encryption by attackers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377199[]' id='answer-id-1468185' class='answer   answerof-377199 ' value='1468185'   \/><label for='answer-id-1468185' id='answer-label-1468185' class=' answer'><span>Accidental deletion of critical files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377199[]' id='answer-id-1468186' class='answer   answerof-377199 ' value='1468186'   \/><label for='answer-id-1468186' id='answer-label-1468186' class=' answer'><span>Prolonged hardware failure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377199[]' id='answer-id-1468187' class='answer   answerof-377199 ' value='1468187'   \/><label for='answer-id-1468187' id='answer-label-1468187' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-377200'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>What is the most effective way to prevent brute-force attacks on passwords?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='377200' \/><input type='hidden' id='answerType377200' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377200[]' id='answer-id-1468188' class='answer   answerof-377200 ' value='1468188'   \/><label for='answer-id-1468188' id='answer-label-1468188' class=' answer'><span>Use firewalls to block traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377200[]' id='answer-id-1468189' class='answer   answerof-377200 ' value='1468189'   \/><label for='answer-id-1468189' id='answer-label-1468189' class=' answer'><span>Require strong password policies and lockout mechanisms<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377200[]' id='answer-id-1468190' class='answer   answerof-377200 ' value='1468190'   \/><label for='answer-id-1468190' id='answer-label-1468190' class=' answer'><span>Encrypt all password files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377200[]' id='answer-id-1468191' class='answer   answerof-377200 ' value='1468191'   \/><label for='answer-id-1468191' id='answer-label-1468191' class=' answer'><span>Implement biometric authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-377201'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>What kind of attack involves overwhelming a server with traffic to make it unavailable?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='377201' \/><input type='hidden' id='answerType377201' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377201[]' id='answer-id-1468192' class='answer   answerof-377201 ' value='1468192'   \/><label for='answer-id-1468192' id='answer-label-1468192' class=' answer'><span>Phishing attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377201[]' id='answer-id-1468193' class='answer   answerof-377201 ' value='1468193'   \/><label for='answer-id-1468193' id='answer-label-1468193' class=' answer'><span>Denial-of-service attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377201[]' id='answer-id-1468194' class='answer   answerof-377201 ' value='1468194'   \/><label for='answer-id-1468194' id='answer-label-1468194' class=' answer'><span>Malware injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377201[]' id='answer-id-1468195' class='answer   answerof-377201 ' value='1468195'   \/><label for='answer-id-1468195' id='answer-label-1468195' class=' answer'><span>Social engineering attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-377202'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>What is the role of a firewall in data security?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='377202' \/><input type='hidden' id='answerType377202' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377202[]' id='answer-id-1468196' class='answer   answerof-377202 ' value='1468196'   \/><label for='answer-id-1468196' id='answer-label-1468196' class=' answer'><span>Encrypt sensitive information<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377202[]' id='answer-id-1468197' class='answer   answerof-377202 ' value='1468197'   \/><label for='answer-id-1468197' id='answer-label-1468197' class=' answer'><span>Monitor and control incoming and outgoing network traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377202[]' id='answer-id-1468198' class='answer   answerof-377202 ' value='1468198'   \/><label for='answer-id-1468198' id='answer-label-1468198' class=' answer'><span>Authenticate users before granting system access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377202[]' id='answer-id-1468199' class='answer   answerof-377202 ' value='1468199'   \/><label for='answer-id-1468199' id='answer-label-1468199' class=' answer'><span>Prevent physical access to servers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-377203'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>What is the best way to minimize insider threats?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='377203' \/><input type='hidden' id='answerType377203' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377203[]' id='answer-id-1468200' class='answer   answerof-377203 ' value='1468200'   \/><label for='answer-id-1468200' id='answer-label-1468200' class=' answer'><span>Monitor network traffic continuously<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377203[]' id='answer-id-1468201' class='answer   answerof-377203 ' value='1468201'   \/><label for='answer-id-1468201' id='answer-label-1468201' class=' answer'><span>Restrict employee access to only necessary data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377203[]' id='answer-id-1468202' class='answer   answerof-377203 ' value='1468202'   \/><label for='answer-id-1468202' id='answer-label-1468202' class=' answer'><span>Implement network segmentation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377203[]' id='answer-id-1468203' class='answer   answerof-377203 ' value='1468203'   \/><label for='answer-id-1468203' id='answer-label-1468203' class=' answer'><span>Encrypt all communications<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-377204'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Which two are common causes of data breaches?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='377204' \/><input type='hidden' id='answerType377204' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377204[]' id='answer-id-1468204' class='answer   answerof-377204 ' value='1468204'   \/><label for='answer-id-1468204' id='answer-label-1468204' class=' answer'><span>Poor password management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377204[]' id='answer-id-1468205' class='answer   answerof-377204 ' value='1468205'   \/><label for='answer-id-1468205' id='answer-label-1468205' class=' answer'><span>Hardware malfunctions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377204[]' id='answer-id-1468206' class='answer   answerof-377204 ' value='1468206'   \/><label for='answer-id-1468206' id='answer-label-1468206' class=' answer'><span>Social engineering attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377204[]' id='answer-id-1468207' class='answer   answerof-377204 ' value='1468207'   \/><label for='answer-id-1468207' id='answer-label-1468207' class=' answer'><span>Lack of data backups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-377205'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>Which of the following best describes a zero-day vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='377205' \/><input type='hidden' id='answerType377205' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377205[]' id='answer-id-1468208' class='answer   answerof-377205 ' value='1468208'   \/><label for='answer-id-1468208' id='answer-label-1468208' class=' answer'><span>A known security flaw with no existing patches<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377205[]' id='answer-id-1468209' class='answer   answerof-377205 ' value='1468209'   \/><label for='answer-id-1468209' id='answer-label-1468209' class=' answer'><span>A flaw exploited after a patch is released<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377205[]' id='answer-id-1468210' class='answer   answerof-377205 ' value='1468210'   \/><label for='answer-id-1468210' id='answer-label-1468210' class=' answer'><span>An outdated security protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377205[]' id='answer-id-1468211' class='answer   answerof-377205 ' value='1468211'   \/><label for='answer-id-1468211' id='answer-label-1468211' class=' answer'><span>A misconfigured firewall setting<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-377206'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>What is a key benefit of using network segmentation?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='377206' \/><input type='hidden' id='answerType377206' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377206[]' id='answer-id-1468212' class='answer   answerof-377206 ' value='1468212'   \/><label for='answer-id-1468212' id='answer-label-1468212' class=' answer'><span>Improved system performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377206[]' id='answer-id-1468213' class='answer   answerof-377206 ' value='1468213'   \/><label for='answer-id-1468213' id='answer-label-1468213' class=' answer'><span>Reduced impact of breaches on critical systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377206[]' id='answer-id-1468214' class='answer   answerof-377206 ' value='1468214'   \/><label for='answer-id-1468214' id='answer-label-1468214' class=' answer'><span>Faster data backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377206[]' id='answer-id-1468215' class='answer   answerof-377206 ' value='1468215'   \/><label for='answer-id-1468215' id='answer-label-1468215' class=' answer'><span>Enhanced physical security<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-377207'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>What is the primary objective of a vulnerability assessment?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='377207' \/><input type='hidden' id='answerType377207' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377207[]' id='answer-id-1468216' class='answer   answerof-377207 ' value='1468216'   \/><label for='answer-id-1468216' id='answer-label-1468216' class=' answer'><span>Identify and prioritize system vulnerabilities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377207[]' id='answer-id-1468217' class='answer   answerof-377207 ' value='1468217'   \/><label for='answer-id-1468217' id='answer-label-1468217' class=' answer'><span>Replace outdated software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377207[]' id='answer-id-1468218' class='answer   answerof-377207 ' value='1468218'   \/><label for='answer-id-1468218' id='answer-label-1468218' class=' answer'><span>Implement disaster recovery plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377207[]' id='answer-id-1468219' class='answer   answerof-377207 ' value='1468219'   \/><label for='answer-id-1468219' id='answer-label-1468219' class=' answer'><span>Encrypt sensitive data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-377208'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>Which are potential impacts of a loss of confidentiality? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_36' value='377208' \/><input type='hidden' id='answerType377208' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377208[]' id='answer-id-1468220' class='answer   answerof-377208 ' value='1468220'   \/><label for='answer-id-1468220' id='answer-label-1468220' class=' answer'><span>Identity theft<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377208[]' id='answer-id-1468221' class='answer   answerof-377208 ' value='1468221'   \/><label for='answer-id-1468221' id='answer-label-1468221' class=' answer'><span>Data corruption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377208[]' id='answer-id-1468222' class='answer   answerof-377208 ' value='1468222'   \/><label for='answer-id-1468222' id='answer-label-1468222' class=' answer'><span>Financial losses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377208[]' id='answer-id-1468223' class='answer   answerof-377208 ' value='1468223'   \/><label for='answer-id-1468223' id='answer-label-1468223' class=' answer'><span>Service unavailability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-377209'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Which type of malware encrypts files and demands payment for access?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='377209' \/><input type='hidden' id='answerType377209' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377209[]' id='answer-id-1468224' class='answer   answerof-377209 ' value='1468224'   \/><label for='answer-id-1468224' id='answer-label-1468224' class=' answer'><span>Spyware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377209[]' id='answer-id-1468225' class='answer   answerof-377209 ' value='1468225'   \/><label for='answer-id-1468225' id='answer-label-1468225' class=' answer'><span>Ransomware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377209[]' id='answer-id-1468226' class='answer   answerof-377209 ' value='1468226'   \/><label for='answer-id-1468226' id='answer-label-1468226' class=' answer'><span>Worms<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377209[]' id='answer-id-1468227' class='answer   answerof-377209 ' value='1468227'   \/><label for='answer-id-1468227' id='answer-label-1468227' class=' answer'><span>Adware<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-377210'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Why is regular patch management critical?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='377210' \/><input type='hidden' id='answerType377210' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377210[]' id='answer-id-1468228' class='answer   answerof-377210 ' value='1468228'   \/><label for='answer-id-1468228' id='answer-label-1468228' class=' answer'><span>To ensure hardware longevity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377210[]' id='answer-id-1468229' class='answer   answerof-377210 ' value='1468229'   \/><label for='answer-id-1468229' id='answer-label-1468229' class=' answer'><span>To reduce downtime during updates<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377210[]' id='answer-id-1468230' class='answer   answerof-377210 ' value='1468230'   \/><label for='answer-id-1468230' id='answer-label-1468230' class=' answer'><span>To fix known vulnerabilities and prevent exploits<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377210[]' id='answer-id-1468231' class='answer   answerof-377210 ' value='1468231'   \/><label for='answer-id-1468231' id='answer-label-1468231' class=' answer'><span>To simplify system configurations<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-377211'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>What is the best practice for securing sensitive data stored in the cloud?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='377211' \/><input type='hidden' id='answerType377211' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377211[]' id='answer-id-1468232' class='answer   answerof-377211 ' value='1468232'   \/><label for='answer-id-1468232' id='answer-label-1468232' class=' answer'><span>Storing it in unstructured formats<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377211[]' id='answer-id-1468233' class='answer   answerof-377211 ' value='1468233'   \/><label for='answer-id-1468233' id='answer-label-1468233' class=' answer'><span>Using strong encryption methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377211[]' id='answer-id-1468234' class='answer   answerof-377211 ' value='1468234'   \/><label for='answer-id-1468234' id='answer-label-1468234' class=' answer'><span>Avoiding access control mechanisms<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377211[]' id='answer-id-1468235' class='answer   answerof-377211 ' value='1468235'   \/><label for='answer-id-1468235' id='answer-label-1468235' class=' answer'><span>Reducing the number of backups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-377212'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>Which two measures can enhance both data integrity and availability?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='377212' \/><input type='hidden' id='answerType377212' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377212[]' id='answer-id-1468236' class='answer   answerof-377212 ' value='1468236'   \/><label for='answer-id-1468236' id='answer-label-1468236' class=' answer'><span>Regular data backups and hash verification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377212[]' id='answer-id-1468237' class='answer   answerof-377212 ' value='1468237'   \/><label for='answer-id-1468237' id='answer-label-1468237' class=' answer'><span>Firewalls and intrusion detection systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377212[]' id='answer-id-1468238' class='answer   answerof-377212 ' value='1468238'   \/><label for='answer-id-1468238' id='answer-label-1468238' class=' answer'><span>Biometric authentication and monitoring<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377212[]' id='answer-id-1468239' class='answer   answerof-377212 ' value='1468239'   \/><label for='answer-id-1468239' id='answer-label-1468239' class=' answer'><span>Security awareness training and disaster recovery plans<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-377213'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Which of the following defines data security?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='377213' \/><input type='hidden' id='answerType377213' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377213[]' id='answer-id-1468240' class='answer   answerof-377213 ' value='1468240'   \/><label for='answer-id-1468240' id='answer-label-1468240' class=' answer'><span>A method of ensuring physical protection of data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377213[]' id='answer-id-1468241' class='answer   answerof-377213 ' value='1468241'   \/><label for='answer-id-1468241' id='answer-label-1468241' class=' answer'><span>Measures to safeguard data from unauthorized access or corruption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377213[]' id='answer-id-1468242' class='answer   answerof-377213 ' value='1468242'   \/><label for='answer-id-1468242' id='answer-label-1468242' class=' answer'><span>Techniques for data duplication and storage.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377213[]' id='answer-id-1468243' class='answer   answerof-377213 ' value='1468243'   \/><label for='answer-id-1468243' id='answer-label-1468243' class=' answer'><span>Ensuring all systems are interconnected.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-377214'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Which are the main components of the CIA triad in security?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='377214' \/><input type='hidden' id='answerType377214' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377214[]' id='answer-id-1468244' class='answer   answerof-377214 ' value='1468244'   \/><label for='answer-id-1468244' id='answer-label-1468244' class=' answer'><span>Authentication, Integrity, Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377214[]' id='answer-id-1468245' class='answer   answerof-377214 ' value='1468245'   \/><label for='answer-id-1468245' id='answer-label-1468245' class=' answer'><span>Confidentiality, Integrity, Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377214[]' id='answer-id-1468246' class='answer   answerof-377214 ' value='1468246'   \/><label for='answer-id-1468246' id='answer-label-1468246' class=' answer'><span>Confidentiality, Accessibility, Authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377214[]' id='answer-id-1468247' class='answer   answerof-377214 ' value='1468247'   \/><label for='answer-id-1468247' id='answer-label-1468247' class=' answer'><span>Authorization, Authentication, Access<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-377215'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>What is the primary goal of confidentiality in the CIA triad?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='377215' \/><input type='hidden' id='answerType377215' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377215[]' id='answer-id-1468248' class='answer   answerof-377215 ' value='1468248'   \/><label for='answer-id-1468248' id='answer-label-1468248' class=' answer'><span>To restrict unauthorized access to sensitive data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377215[]' id='answer-id-1468249' class='answer   answerof-377215 ' value='1468249'   \/><label for='answer-id-1468249' id='answer-label-1468249' class=' answer'><span>To ensure all data is backed up.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377215[]' id='answer-id-1468250' class='answer   answerof-377215 ' value='1468250'   \/><label for='answer-id-1468250' id='answer-label-1468250' class=' answer'><span>To protect systems from malware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377215[]' id='answer-id-1468251' class='answer   answerof-377215 ' value='1468251'   \/><label for='answer-id-1468251' id='answer-label-1468251' class=' answer'><span>To provide 24\/7 access to systems.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-377216'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>A distributed denial-of-service (DDoS) attack primarily affects which aspect of security?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='377216' \/><input type='hidden' id='answerType377216' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377216[]' id='answer-id-1468252' class='answer   answerof-377216 ' value='1468252'   \/><label for='answer-id-1468252' id='answer-label-1468252' class=' answer'><span>Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377216[]' id='answer-id-1468253' class='answer   answerof-377216 ' value='1468253'   \/><label for='answer-id-1468253' id='answer-label-1468253' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377216[]' id='answer-id-1468254' class='answer   answerof-377216 ' value='1468254'   \/><label for='answer-id-1468254' id='answer-label-1468254' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377216[]' id='answer-id-1468255' class='answer   answerof-377216 ' value='1468255'   \/><label for='answer-id-1468255' id='answer-label-1468255' class=' answer'><span>Authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-377217'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>Which of the following are considered potential losses due to security attacks? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_45' value='377217' \/><input type='hidden' id='answerType377217' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377217[]' id='answer-id-1468256' class='answer   answerof-377217 ' value='1468256'   \/><label for='answer-id-1468256' id='answer-label-1468256' class=' answer'><span>Financial losses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377217[]' id='answer-id-1468257' class='answer   answerof-377217 ' value='1468257'   \/><label for='answer-id-1468257' id='answer-label-1468257' class=' answer'><span>Improved system performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377217[]' id='answer-id-1468258' class='answer   answerof-377217 ' value='1468258'   \/><label for='answer-id-1468258' id='answer-label-1468258' class=' answer'><span>Loss of customer trust<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377217[]' id='answer-id-1468259' class='answer   answerof-377217 ' value='1468259'   \/><label for='answer-id-1468259' id='answer-label-1468259' class=' answer'><span>Reduction in data redundancy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-377218'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>What is a key purpose of encryption in data security?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='377218' \/><input type='hidden' id='answerType377218' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377218[]' id='answer-id-1468260' class='answer   answerof-377218 ' value='1468260'   \/><label for='answer-id-1468260' id='answer-label-1468260' class=' answer'><span>To make data readily accessible.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377218[]' id='answer-id-1468261' class='answer   answerof-377218 ' value='1468261'   \/><label for='answer-id-1468261' id='answer-label-1468261' class=' answer'><span>To ensure data is transmitted securely.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377218[]' id='answer-id-1468262' class='answer   answerof-377218 ' value='1468262'   \/><label for='answer-id-1468262' id='answer-label-1468262' class=' answer'><span>To reduce the need for firewalls.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377218[]' id='answer-id-1468263' class='answer   answerof-377218 ' value='1468263'   \/><label for='answer-id-1468263' id='answer-label-1468263' class=' answer'><span>To optimize system performance.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-377219'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>An employee accidentally deletes critical files. <br \/>\r<br>What type of loss does this represent?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='377219' \/><input type='hidden' id='answerType377219' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377219[]' id='answer-id-1468264' class='answer   answerof-377219 ' value='1468264'   \/><label for='answer-id-1468264' id='answer-label-1468264' class=' answer'><span>Loss of confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377219[]' id='answer-id-1468265' class='answer   answerof-377219 ' value='1468265'   \/><label for='answer-id-1468265' id='answer-label-1468265' class=' answer'><span>Loss of availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377219[]' id='answer-id-1468266' class='answer   answerof-377219 ' value='1468266'   \/><label for='answer-id-1468266' id='answer-label-1468266' class=' answer'><span>Loss of integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377219[]' id='answer-id-1468267' class='answer   answerof-377219 ' value='1468267'   \/><label for='answer-id-1468267' id='answer-label-1468267' class=' answer'><span>Regulatory non-compliance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-377220'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>What is the role of authentication in data security?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='377220' \/><input type='hidden' id='answerType377220' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377220[]' id='answer-id-1468268' class='answer   answerof-377220 ' value='1468268'   \/><label for='answer-id-1468268' id='answer-label-1468268' class=' answer'><span>To protect against phishing attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377220[]' id='answer-id-1468269' class='answer   answerof-377220 ' value='1468269'   \/><label for='answer-id-1468269' id='answer-label-1468269' class=' answer'><span>To verify the identity of users accessing a system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377220[]' id='answer-id-1468270' class='answer   answerof-377220 ' value='1468270'   \/><label for='answer-id-1468270' id='answer-label-1468270' class=' answer'><span>To enable encryption of sensitive data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377220[]' id='answer-id-1468271' class='answer   answerof-377220 ' value='1468271'   \/><label for='answer-id-1468271' id='answer-label-1468271' class=' answer'><span>To prevent hardware malfunctions.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-377221'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>Which of the following ensures data availability?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='377221' \/><input type='hidden' id='answerType377221' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377221[]' id='answer-id-1468272' class='answer   answerof-377221 ' value='1468272'   \/><label for='answer-id-1468272' id='answer-label-1468272' class=' answer'><span>Frequent data backups and redundancy measures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377221[]' id='answer-id-1468273' class='answer   answerof-377221 ' value='1468273'   \/><label for='answer-id-1468273' id='answer-label-1468273' class=' answer'><span>Strong passwords and encryption methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377221[]' id='answer-id-1468274' class='answer   answerof-377221 ' value='1468274'   \/><label for='answer-id-1468274' id='answer-label-1468274' class=' answer'><span>Firewalls and intrusion detection systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377221[]' id='answer-id-1468275' class='answer   answerof-377221 ' value='1468275'   \/><label for='answer-id-1468275' id='answer-label-1468275' class=' answer'><span>Regular software updates<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-377222'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>Which two actions can protect the integrity of data?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='377222' \/><input type='hidden' id='answerType377222' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377222[]' id='answer-id-1468276' class='answer   answerof-377222 ' value='1468276'   \/><label for='answer-id-1468276' id='answer-label-1468276' class=' answer'><span>Implementing strong access controls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377222[]' id='answer-id-1468277' class='answer   answerof-377222 ' value='1468277'   \/><label for='answer-id-1468277' id='answer-label-1468277' class=' answer'><span>Performing regular data backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377222[]' id='answer-id-1468278' class='answer   answerof-377222 ' value='1468278'   \/><label for='answer-id-1468278' id='answer-label-1468278' class=' answer'><span>Encrypting data during transmission<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377222[]' id='answer-id-1468279' class='answer   answerof-377222 ' value='1468279'   \/><label for='answer-id-1468279' id='answer-label-1468279' class=' answer'><span>Using hashing techniques for data validation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-377223'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>Which term refers to an unauthorized entity gaining access to sensitive data?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='377223' \/><input type='hidden' id='answerType377223' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377223[]' id='answer-id-1468280' class='answer   answerof-377223 ' value='1468280'   \/><label for='answer-id-1468280' id='answer-label-1468280' class=' answer'><span>Data breach<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377223[]' id='answer-id-1468281' class='answer   answerof-377223 ' value='1468281'   \/><label for='answer-id-1468281' id='answer-label-1468281' class=' answer'><span>Data masking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377223[]' id='answer-id-1468282' class='answer   answerof-377223 ' value='1468282'   \/><label for='answer-id-1468282' id='answer-label-1468282' class=' answer'><span>Data redundancy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377223[]' id='answer-id-1468283' class='answer   answerof-377223 ' value='1468283'   \/><label for='answer-id-1468283' id='answer-label-1468283' class=' answer'><span>Data audit<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-377224'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>Which element of security prevents unauthorized data modification?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='377224' \/><input type='hidden' id='answerType377224' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377224[]' id='answer-id-1468284' class='answer   answerof-377224 ' value='1468284'   \/><label for='answer-id-1468284' id='answer-label-1468284' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377224[]' id='answer-id-1468285' class='answer   answerof-377224 ' value='1468285'   \/><label for='answer-id-1468285' id='answer-label-1468285' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377224[]' id='answer-id-1468286' class='answer   answerof-377224 ' value='1468286'   \/><label for='answer-id-1468286' id='answer-label-1468286' class=' answer'><span>Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377224[]' id='answer-id-1468287' class='answer   answerof-377224 ' value='1468287'   \/><label for='answer-id-1468287' id='answer-label-1468287' class=' answer'><span>Scalability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-377225'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>A ransomware attack primarily affects which security element?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='377225' \/><input type='hidden' id='answerType377225' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377225[]' id='answer-id-1468288' class='answer   answerof-377225 ' value='1468288'   \/><label for='answer-id-1468288' id='answer-label-1468288' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377225[]' id='answer-id-1468289' class='answer   answerof-377225 ' value='1468289'   \/><label for='answer-id-1468289' id='answer-label-1468289' class=' answer'><span>Availability<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377225[]' id='answer-id-1468290' class='answer   answerof-377225 ' value='1468290'   \/><label for='answer-id-1468290' id='answer-label-1468290' class=' answer'><span>Integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377225[]' id='answer-id-1468291' class='answer   answerof-377225 ' value='1468291'   \/><label for='answer-id-1468291' id='answer-label-1468291' class=' answer'><span>Scalability<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-377226'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>What is the first step in a robust data security strategy?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='377226' \/><input type='hidden' id='answerType377226' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377226[]' id='answer-id-1468292' class='answer   answerof-377226 ' value='1468292'   \/><label for='answer-id-1468292' id='answer-label-1468292' class=' answer'><span>Encrypting all sensitive files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377226[]' id='answer-id-1468293' class='answer   answerof-377226 ' value='1468293'   \/><label for='answer-id-1468293' id='answer-label-1468293' class=' answer'><span>Identifying and classifying sensitive data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377226[]' id='answer-id-1468294' class='answer   answerof-377226 ' value='1468294'   \/><label for='answer-id-1468294' id='answer-label-1468294' class=' answer'><span>Deploying a firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377226[]' id='answer-id-1468295' class='answer   answerof-377226 ' value='1468295'   \/><label for='answer-id-1468295' id='answer-label-1468295' class=' answer'><span>Implementing multi-factor authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-377227'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>Which two practices enhance confidentiality in data security?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='377227' \/><input type='hidden' id='answerType377227' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377227[]' id='answer-id-1468296' class='answer   answerof-377227 ' value='1468296'   \/><label for='answer-id-1468296' id='answer-label-1468296' class=' answer'><span>Encryption and access controls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377227[]' id='answer-id-1468297' class='answer   answerof-377227 ' value='1468297'   \/><label for='answer-id-1468297' id='answer-label-1468297' class=' answer'><span>Firewalls and disaster recovery plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377227[]' id='answer-id-1468298' class='answer   answerof-377227 ' value='1468298'   \/><label for='answer-id-1468298' id='answer-label-1468298' class=' answer'><span>Data redundancy and hashing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377227[]' id='answer-id-1468299' class='answer   answerof-377227 ' value='1468299'   \/><label for='answer-id-1468299' id='answer-label-1468299' class=' answer'><span>Incident response plans and backups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-377228'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>What is the key benefit of multi-factor authentication (MFA)?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='377228' \/><input type='hidden' id='answerType377228' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377228[]' id='answer-id-1468300' class='answer   answerof-377228 ' value='1468300'   \/><label for='answer-id-1468300' id='answer-label-1468300' class=' answer'><span>Simplifies password management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377228[]' id='answer-id-1468301' class='answer   answerof-377228 ' value='1468301'   \/><label for='answer-id-1468301' id='answer-label-1468301' class=' answer'><span>Enhances system performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377228[]' id='answer-id-1468302' class='answer   answerof-377228 ' value='1468302'   \/><label for='answer-id-1468302' id='answer-label-1468302' class=' answer'><span>Increases security by requiring multiple credentials<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377228[]' id='answer-id-1468303' class='answer   answerof-377228 ' value='1468303'   \/><label for='answer-id-1468303' id='answer-label-1468303' class=' answer'><span>Eliminates the need for strong passwords<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-377229'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>Which of the following are potential impacts of a phishing attack? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_57' value='377229' \/><input type='hidden' id='answerType377229' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377229[]' id='answer-id-1468304' class='answer   answerof-377229 ' value='1468304'   \/><label for='answer-id-1468304' id='answer-label-1468304' class=' answer'><span>Unauthorized data access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377229[]' id='answer-id-1468305' class='answer   answerof-377229 ' value='1468305'   \/><label for='answer-id-1468305' id='answer-label-1468305' class=' answer'><span>System hardware damage<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377229[]' id='answer-id-1468306' class='answer   answerof-377229 ' value='1468306'   \/><label for='answer-id-1468306' id='answer-label-1468306' class=' answer'><span>Credential theft<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377229[]' id='answer-id-1468307' class='answer   answerof-377229 ' value='1468307'   \/><label for='answer-id-1468307' id='answer-label-1468307' class=' answer'><span>Improved network speed<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-377230'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>What is the purpose of access control in security?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='377230' \/><input type='hidden' id='answerType377230' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377230[]' id='answer-id-1468308' class='answer   answerof-377230 ' value='1468308'   \/><label for='answer-id-1468308' id='answer-label-1468308' class=' answer'><span>To secure physical servers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377230[]' id='answer-id-1468309' class='answer   answerof-377230 ' value='1468309'   \/><label for='answer-id-1468309' id='answer-label-1468309' class=' answer'><span>To restrict unauthorized access to data and systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377230[]' id='answer-id-1468310' class='answer   answerof-377230 ' value='1468310'   \/><label for='answer-id-1468310' id='answer-label-1468310' class=' answer'><span>To create user accounts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377230[]' id='answer-id-1468311' class='answer   answerof-377230 ' value='1468311'   \/><label for='answer-id-1468311' id='answer-label-1468311' class=' answer'><span>To prevent phishing emails<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-377231'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>Which type of attack often leads to identity theft?<\/div><input type='hidden' name='question_id[]' id='qID_59' value='377231' \/><input type='hidden' id='answerType377231' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377231[]' id='answer-id-1468312' class='answer   answerof-377231 ' value='1468312'   \/><label for='answer-id-1468312' id='answer-label-1468312' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377231[]' id='answer-id-1468313' class='answer   answerof-377231 ' value='1468313'   \/><label for='answer-id-1468313' id='answer-label-1468313' class=' answer'><span>Man-in-the-middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377231[]' id='answer-id-1468314' class='answer   answerof-377231 ' value='1468314'   \/><label for='answer-id-1468314' id='answer-label-1468314' class=' answer'><span>Denial-of-service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377231[]' id='answer-id-1468315' class='answer   answerof-377231 ' value='1468315'   \/><label for='answer-id-1468315' id='answer-label-1468315' class=' answer'><span>Malware<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-377232'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>What is a potential consequence of unpatched software vulnerabilities?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='377232' \/><input type='hidden' id='answerType377232' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377232[]' id='answer-id-1468316' class='answer   answerof-377232 ' value='1468316'   \/><label for='answer-id-1468316' id='answer-label-1468316' class=' answer'><span>Reduced encryption strength<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377232[]' id='answer-id-1468317' class='answer   answerof-377232 ' value='1468317'   \/><label for='answer-id-1468317' id='answer-label-1468317' class=' answer'><span>Unauthorized system access by attackers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377232[]' id='answer-id-1468318' class='answer   answerof-377232 ' value='1468318'   \/><label for='answer-id-1468318' id='answer-label-1468318' class=' answer'><span>Improved system speed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377232[]' id='answer-id-1468319' class='answer   answerof-377232 ' value='1468319'   \/><label for='answer-id-1468319' id='answer-label-1468319' class=' answer'><span>Increased network redundancy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-377233'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>What is the purpose of data masking in data security?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='377233' \/><input type='hidden' id='answerType377233' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377233[]' id='answer-id-1468320' class='answer   answerof-377233 ' value='1468320'   \/><label for='answer-id-1468320' id='answer-label-1468320' class=' answer'><span>Encrypt data during transmission.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377233[]' id='answer-id-1468321' class='answer   answerof-377233 ' value='1468321'   \/><label for='answer-id-1468321' id='answer-label-1468321' class=' answer'><span>Obscure sensitive data for non-production environments.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377233[]' id='answer-id-1468322' class='answer   answerof-377233 ' value='1468322'   \/><label for='answer-id-1468322' id='answer-label-1468322' class=' answer'><span>Improve data availability in redundant systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377233[]' id='answer-id-1468323' class='answer   answerof-377233 ' value='1468323'   \/><label for='answer-id-1468323' id='answer-label-1468323' class=' answer'><span>Facilitate faster data recovery.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-377234'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>Which attack method is specifically designed to compromise the availability of a system?<\/div><input type='hidden' name='question_id[]' id='qID_62' value='377234' \/><input type='hidden' id='answerType377234' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377234[]' id='answer-id-1468324' class='answer   answerof-377234 ' value='1468324'   \/><label for='answer-id-1468324' id='answer-label-1468324' class=' answer'><span>Phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377234[]' id='answer-id-1468325' class='answer   answerof-377234 ' value='1468325'   \/><label for='answer-id-1468325' id='answer-label-1468325' class=' answer'><span>Denial-of-service (DoS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377234[]' id='answer-id-1468326' class='answer   answerof-377234 ' value='1468326'   \/><label for='answer-id-1468326' id='answer-label-1468326' class=' answer'><span>Man-in-the-middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377234[]' id='answer-id-1468327' class='answer   answerof-377234 ' value='1468327'   \/><label for='answer-id-1468327' id='answer-label-1468327' class=' answer'><span>Ransomware<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-377235'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>What is a key element of ensuring data integrity?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='377235' \/><input type='hidden' id='answerType377235' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377235[]' id='answer-id-1468328' class='answer   answerof-377235 ' value='1468328'   \/><label for='answer-id-1468328' id='answer-label-1468328' class=' answer'><span>Implementing strict access controls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377235[]' id='answer-id-1468329' class='answer   answerof-377235 ' value='1468329'   \/><label for='answer-id-1468329' id='answer-label-1468329' class=' answer'><span>Using hashing algorithms for data validation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377235[]' id='answer-id-1468330' class='answer   answerof-377235 ' value='1468330'   \/><label for='answer-id-1468330' id='answer-label-1468330' class=' answer'><span>Encrypting data during transmission<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377235[]' id='answer-id-1468331' class='answer   answerof-377235 ' value='1468331'   \/><label for='answer-id-1468331' id='answer-label-1468331' class=' answer'><span>Restricting physical access to servers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-377236'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>Which two measures help maintain the availability of data during an attack?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='377236' \/><input type='hidden' id='answerType377236' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377236[]' id='answer-id-1468332' class='answer   answerof-377236 ' value='1468332'   \/><label for='answer-id-1468332' id='answer-label-1468332' class=' answer'><span>Data redundancy and failover systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377236[]' id='answer-id-1468333' class='answer   answerof-377236 ' value='1468333'   \/><label for='answer-id-1468333' id='answer-label-1468333' class=' answer'><span>Strong passwords and encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377236[]' id='answer-id-1468334' class='answer   answerof-377236 ' value='1468334'   \/><label for='answer-id-1468334' id='answer-label-1468334' class=' answer'><span>Multi-factor authentication and hashing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377236[]' id='answer-id-1468335' class='answer   answerof-377236 ' value='1468335'   \/><label for='answer-id-1468335' id='answer-label-1468335' class=' answer'><span>Firewalls and intrusion detection systems<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-377237'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>Which of the following best describes a man-in-the-middle attack?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='377237' \/><input type='hidden' id='answerType377237' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377237[]' id='answer-id-1468336' class='answer   answerof-377237 ' value='1468336'   \/><label for='answer-id-1468336' id='answer-label-1468336' class=' answer'><span>Exploiting software vulnerabilities to gain access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377237[]' id='answer-id-1468337' class='answer   answerof-377237 ' value='1468337'   \/><label for='answer-id-1468337' id='answer-label-1468337' class=' answer'><span>Intercepting and altering communications between two parties.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377237[]' id='answer-id-1468338' class='answer   answerof-377237 ' value='1468338'   \/><label for='answer-id-1468338' id='answer-label-1468338' class=' answer'><span>Overloading systems with traffic to deny service.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377237[]' id='answer-id-1468339' class='answer   answerof-377237 ' value='1468339'   \/><label for='answer-id-1468339' id='answer-label-1468339' class=' answer'><span>Distributing malware to gain system control.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-377238'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>What is the main purpose of disaster recovery plans in data security?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='377238' \/><input type='hidden' id='answerType377238' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377238[]' id='answer-id-1468340' class='answer   answerof-377238 ' value='1468340'   \/><label for='answer-id-1468340' id='answer-label-1468340' class=' answer'><span>Prevent phishing attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377238[]' id='answer-id-1468341' class='answer   answerof-377238 ' value='1468341'   \/><label for='answer-id-1468341' id='answer-label-1468341' class=' answer'><span>Ensure rapid recovery after a security incident.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377238[]' id='answer-id-1468342' class='answer   answerof-377238 ' value='1468342'   \/><label for='answer-id-1468342' id='answer-label-1468342' class=' answer'><span>Enhance system performance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377238[]' id='answer-id-1468343' class='answer   answerof-377238 ' value='1468343'   \/><label for='answer-id-1468343' id='answer-label-1468343' class=' answer'><span>Monitor and log system activity.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-377239'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>Which two factors contribute to the loss of confidentiality in a system?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='377239' \/><input type='hidden' id='answerType377239' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377239[]' id='answer-id-1468344' class='answer   answerof-377239 ' value='1468344'   \/><label for='answer-id-1468344' id='answer-label-1468344' class=' answer'><span>Weak password policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377239[]' id='answer-id-1468345' class='answer   answerof-377239 ' value='1468345'   \/><label for='answer-id-1468345' id='answer-label-1468345' class=' answer'><span>Data encryption during transmission<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377239[]' id='answer-id-1468346' class='answer   answerof-377239 ' value='1468346'   \/><label for='answer-id-1468346' id='answer-label-1468346' class=' answer'><span>Lack of access controls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377239[]' id='answer-id-1468347' class='answer   answerof-377239 ' value='1468347'   \/><label for='answer-id-1468347' id='answer-label-1468347' class=' answer'><span>Hashing techniques for validation<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-377240'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>What is the key characteristic of ransomware attacks?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='377240' \/><input type='hidden' id='answerType377240' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377240[]' id='answer-id-1468348' class='answer   answerof-377240 ' value='1468348'   \/><label for='answer-id-1468348' id='answer-label-1468348' class=' answer'><span>Encrypting data to restrict access until a ransom is paid.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377240[]' id='answer-id-1468349' class='answer   answerof-377240 ' value='1468349'   \/><label for='answer-id-1468349' id='answer-label-1468349' class=' answer'><span>Infecting systems with malicious spyware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377240[]' id='answer-id-1468350' class='answer   answerof-377240 ' value='1468350'   \/><label for='answer-id-1468350' id='answer-label-1468350' class=' answer'><span>Overloading systems with fake traffic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377240[]' id='answer-id-1468351' class='answer   answerof-377240 ' value='1468351'   \/><label for='answer-id-1468351' id='answer-label-1468351' class=' answer'><span>Intercepting communication between devices.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-377241'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>What is the role of intrusion detection systems (IDS) in security?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='377241' \/><input type='hidden' id='answerType377241' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377241[]' id='answer-id-1468352' class='answer   answerof-377241 ' value='1468352'   \/><label for='answer-id-1468352' id='answer-label-1468352' class=' answer'><span>Prevent unauthorized access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377241[]' id='answer-id-1468353' class='answer   answerof-377241 ' value='1468353'   \/><label for='answer-id-1468353' id='answer-label-1468353' class=' answer'><span>Detect and alert administrators of potential breaches.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377241[]' id='answer-id-1468354' class='answer   answerof-377241 ' value='1468354'   \/><label for='answer-id-1468354' id='answer-label-1468354' class=' answer'><span>Encrypt sensitive communications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377241[]' id='answer-id-1468355' class='answer   answerof-377241 ' value='1468355'   \/><label for='answer-id-1468355' id='answer-label-1468355' class=' answer'><span>Enhance physical security measures.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-377242'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>Which security measure best prevents phishing attacks?<\/div><input type='hidden' name='question_id[]' id='qID_70' value='377242' \/><input type='hidden' id='answerType377242' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377242[]' id='answer-id-1468356' class='answer   answerof-377242 ' value='1468356'   \/><label for='answer-id-1468356' id='answer-label-1468356' class=' answer'><span>Regular employee awareness training<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377242[]' id='answer-id-1468357' class='answer   answerof-377242 ' value='1468357'   \/><label for='answer-id-1468357' id='answer-label-1468357' class=' answer'><span>Strong encryption algorithms<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377242[]' id='answer-id-1468358' class='answer   answerof-377242 ' value='1468358'   \/><label for='answer-id-1468358' id='answer-label-1468358' class=' answer'><span>Redundant backups of sensitive data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377242[]' id='answer-id-1468359' class='answer   answerof-377242 ' value='1468359'   \/><label for='answer-id-1468359' id='answer-label-1468359' class=' answer'><span>Biometric access controls<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-377243'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>Which of the following contributes to a loss of data availability?<\/div><input type='hidden' name='question_id[]' id='qID_71' value='377243' \/><input type='hidden' id='answerType377243' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377243[]' id='answer-id-1468360' class='answer   answerof-377243 ' value='1468360'   \/><label for='answer-id-1468360' id='answer-label-1468360' class=' answer'><span>Unauthorized encryption by ransomware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377243[]' id='answer-id-1468361' class='answer   answerof-377243 ' value='1468361'   \/><label for='answer-id-1468361' id='answer-label-1468361' class=' answer'><span>Weak password policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377243[]' id='answer-id-1468362' class='answer   answerof-377243 ' value='1468362'   \/><label for='answer-id-1468362' id='answer-label-1468362' class=' answer'><span>Secure data backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377243[]' id='answer-id-1468363' class='answer   answerof-377243 ' value='1468363'   \/><label for='answer-id-1468363' id='answer-label-1468363' class=' answer'><span>Strong access control mechanisms<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-377244'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>What is a primary function of encryption in data security?<\/div><input type='hidden' name='question_id[]' id='qID_72' value='377244' \/><input type='hidden' id='answerType377244' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377244[]' id='answer-id-1468364' class='answer   answerof-377244 ' value='1468364'   \/><label for='answer-id-1468364' id='answer-label-1468364' class=' answer'><span>Improve system performance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377244[]' id='answer-id-1468365' class='answer   answerof-377244 ' value='1468365'   \/><label for='answer-id-1468365' id='answer-label-1468365' class=' answer'><span>Prevent unauthorized access to data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377244[]' id='answer-id-1468366' class='answer   answerof-377244 ' value='1468366'   \/><label for='answer-id-1468366' id='answer-label-1468366' class=' answer'><span>Enable seamless data sharing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377244[]' id='answer-id-1468367' class='answer   answerof-377244 ' value='1468367'   \/><label for='answer-id-1468367' id='answer-label-1468367' class=' answer'><span>Reduce storage requirements.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-377245'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>Which are common potential losses from a data breach? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_73' value='377245' \/><input type='hidden' id='answerType377245' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377245[]' id='answer-id-1468368' class='answer   answerof-377245 ' value='1468368'   \/><label for='answer-id-1468368' id='answer-label-1468368' class=' answer'><span>Financial penalties<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377245[]' id='answer-id-1468369' class='answer   answerof-377245 ' value='1468369'   \/><label for='answer-id-1468369' id='answer-label-1468369' class=' answer'><span>Enhanced system performance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377245[]' id='answer-id-1468370' class='answer   answerof-377245 ' value='1468370'   \/><label for='answer-id-1468370' id='answer-label-1468370' class=' answer'><span>Loss of customer trust<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377245[]' id='answer-id-1468371' class='answer   answerof-377245 ' value='1468371'   \/><label for='answer-id-1468371' id='answer-label-1468371' class=' answer'><span>Increased data redundancy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-377246'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>What is the primary advantage of implementing access controls?<\/div><input type='hidden' name='question_id[]' id='qID_74' value='377246' \/><input type='hidden' id='answerType377246' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377246[]' id='answer-id-1468372' class='answer   answerof-377246 ' value='1468372'   \/><label for='answer-id-1468372' id='answer-label-1468372' class=' answer'><span>To speed up system processes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377246[]' id='answer-id-1468373' class='answer   answerof-377246 ' value='1468373'   \/><label for='answer-id-1468373' id='answer-label-1468373' class=' answer'><span>To restrict unauthorized access to sensitive information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377246[]' id='answer-id-1468374' class='answer   answerof-377246 ' value='1468374'   \/><label for='answer-id-1468374' id='answer-label-1468374' class=' answer'><span>To simplify data encryption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377246[]' id='answer-id-1468375' class='answer   answerof-377246 ' value='1468375'   \/><label for='answer-id-1468375' id='answer-label-1468375' class=' answer'><span>To reduce the need for system audits.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-377247'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>Which of the following best describes a zero-day attack?<\/div><input type='hidden' name='question_id[]' id='qID_75' value='377247' \/><input type='hidden' id='answerType377247' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377247[]' id='answer-id-1468376' class='answer   answerof-377247 ' value='1468376'   \/><label for='answer-id-1468376' id='answer-label-1468376' class=' answer'><span>Exploiting a known vulnerability without a patch.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377247[]' id='answer-id-1468377' class='answer   answerof-377247 ' value='1468377'   \/><label for='answer-id-1468377' id='answer-label-1468377' class=' answer'><span>Attacking systems after a vulnerability is patched.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377247[]' id='answer-id-1468378' class='answer   answerof-377247 ' value='1468378'   \/><label for='answer-id-1468378' id='answer-label-1468378' class=' answer'><span>Using outdated software for malicious purposes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377247[]' id='answer-id-1468379' class='answer   answerof-377247 ' value='1468379'   \/><label for='answer-id-1468379' id='answer-label-1468379' class=' answer'><span>Monitoring network traffic for suspicious activity.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-377248'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>What is a key characteristic of hashing in security?<\/div><input type='hidden' name='question_id[]' id='qID_76' value='377248' \/><input type='hidden' id='answerType377248' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377248[]' id='answer-id-1468380' class='answer   answerof-377248 ' value='1468380'   \/><label for='answer-id-1468380' id='answer-label-1468380' class=' answer'><span>Converts data into unreadable encrypted formats.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377248[]' id='answer-id-1468381' class='answer   answerof-377248 ' value='1468381'   \/><label for='answer-id-1468381' id='answer-label-1468381' class=' answer'><span>Verifies data integrity by detecting unauthorized changes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377248[]' id='answer-id-1468382' class='answer   answerof-377248 ' value='1468382'   \/><label for='answer-id-1468382' id='answer-label-1468382' class=' answer'><span>Ensures uninterrupted access to sensitive information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377248[]' id='answer-id-1468383' class='answer   answerof-377248 ' value='1468383'   \/><label for='answer-id-1468383' id='answer-label-1468383' class=' answer'><span>Enhances data redundancy for recovery purposes.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-377249'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>Which of the following reduces the impact of insider threats?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='377249' \/><input type='hidden' id='answerType377249' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377249[]' id='answer-id-1468384' class='answer   answerof-377249 ' value='1468384'   \/><label for='answer-id-1468384' id='answer-label-1468384' class=' answer'><span>Encrypting data at rest.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377249[]' id='answer-id-1468385' class='answer   answerof-377249 ' value='1468385'   \/><label for='answer-id-1468385' id='answer-label-1468385' class=' answer'><span>Implementing role-based access controls.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377249[]' id='answer-id-1468386' class='answer   answerof-377249 ' value='1468386'   \/><label for='answer-id-1468386' id='answer-label-1468386' class=' answer'><span>Using redundant storage systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377249[]' id='answer-id-1468387' class='answer   answerof-377249 ' value='1468387'   \/><label for='answer-id-1468387' id='answer-label-1468387' class=' answer'><span>Regularly updating antivirus software.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-377250'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>What is the most effective way to mitigate risks associated with unpatched vulnerabilities?<\/div><input type='hidden' name='question_id[]' id='qID_78' value='377250' \/><input type='hidden' id='answerType377250' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377250[]' id='answer-id-1468388' class='answer   answerof-377250 ' value='1468388'   \/><label for='answer-id-1468388' id='answer-label-1468388' class=' answer'><span>Encrypting sensitive data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377250[]' id='answer-id-1468389' class='answer   answerof-377250 ' value='1468389'   \/><label for='answer-id-1468389' id='answer-label-1468389' class=' answer'><span>Implementing a regular patch management process.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377250[]' id='answer-id-1468390' class='answer   answerof-377250 ' value='1468390'   \/><label for='answer-id-1468390' id='answer-label-1468390' class=' answer'><span>Conducting monthly data audits.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377250[]' id='answer-id-1468391' class='answer   answerof-377250 ' value='1468391'   \/><label for='answer-id-1468391' id='answer-label-1468391' class=' answer'><span>Limiting network bandwidth.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-377251'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>Which security measure protects data in transit?<\/div><input type='hidden' name='question_id[]' id='qID_79' value='377251' \/><input type='hidden' id='answerType377251' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377251[]' id='answer-id-1468392' class='answer   answerof-377251 ' value='1468392'   \/><label for='answer-id-1468392' id='answer-label-1468392' class=' answer'><span>Firewalls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377251[]' id='answer-id-1468393' class='answer   answerof-377251 ' value='1468393'   \/><label for='answer-id-1468393' id='answer-label-1468393' class=' answer'><span>Encryption protocols<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377251[]' id='answer-id-1468394' class='answer   answerof-377251 ' value='1468394'   \/><label for='answer-id-1468394' id='answer-label-1468394' class=' answer'><span>Multi-factor authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377251[]' id='answer-id-1468395' class='answer   answerof-377251 ' value='1468395'   \/><label for='answer-id-1468395' id='answer-label-1468395' class=' answer'><span>Data backups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-377252'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>Which two actions enhance both confidentiality and availability?<\/div><input type='hidden' name='question_id[]' id='qID_80' value='377252' \/><input type='hidden' id='answerType377252' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377252[]' id='answer-id-1468396' class='answer   answerof-377252 ' value='1468396'   \/><label for='answer-id-1468396' id='answer-label-1468396' class=' answer'><span>Data encryption and failover systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377252[]' id='answer-id-1468397' class='answer   answerof-377252 ' value='1468397'   \/><label for='answer-id-1468397' id='answer-label-1468397' class=' answer'><span>Role-based access controls and redundant backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377252[]' id='answer-id-1468398' class='answer   answerof-377252 ' value='1468398'   \/><label for='answer-id-1468398' id='answer-label-1468398' class=' answer'><span>Regular data audits and physical security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377252[]' id='answer-id-1468399' class='answer   answerof-377252 ' value='1468399'   \/><label for='answer-id-1468399' id='answer-label-1468399' class=' answer'><span>Disaster recovery plans and hashing techniques<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-81' style=';'><div id='questionWrap-81'  class='   watupro-question-id-377253'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>81. <\/span>Which of the following is the primary characteristic of malware?<\/div><input type='hidden' name='question_id[]' id='qID_81' value='377253' \/><input type='hidden' id='answerType377253' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377253[]' id='answer-id-1468400' class='answer   answerof-377253 ' value='1468400'   \/><label for='answer-id-1468400' id='answer-label-1468400' class=' answer'><span>Software designed to enhance system performance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377253[]' id='answer-id-1468401' class='answer   answerof-377253 ' value='1468401'   \/><label for='answer-id-1468401' id='answer-label-1468401' class=' answer'><span>Software intended to disrupt, damage, or gain unauthorized access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377253[]' id='answer-id-1468402' class='answer   answerof-377253 ' value='1468402'   \/><label for='answer-id-1468402' id='answer-label-1468402' class=' answer'><span>Software that prevents unauthorized access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377253[]' id='answer-id-1468403' class='answer   answerof-377253 ' value='1468403'   \/><label for='answer-id-1468403' id='answer-label-1468403' class=' answer'><span>Software that only affects outdated operating systems.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-82' style=';'><div id='questionWrap-82'  class='   watupro-question-id-377254'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>82. <\/span>Which type of malware encrypts user data and demands payment for its release?<\/div><input type='hidden' name='question_id[]' id='qID_82' value='377254' \/><input type='hidden' id='answerType377254' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377254[]' id='answer-id-1468404' class='answer   answerof-377254 ' value='1468404'   \/><label for='answer-id-1468404' id='answer-label-1468404' class=' answer'><span>Spyware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377254[]' id='answer-id-1468405' class='answer   answerof-377254 ' value='1468405'   \/><label for='answer-id-1468405' id='answer-label-1468405' class=' answer'><span>Ransomware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377254[]' id='answer-id-1468406' class='answer   answerof-377254 ' value='1468406'   \/><label for='answer-id-1468406' id='answer-label-1468406' class=' answer'><span>Worms<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377254[]' id='answer-id-1468407' class='answer   answerof-377254 ' value='1468407'   \/><label for='answer-id-1468407' id='answer-label-1468407' class=' answer'><span>Adware<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-83' style=';'><div id='questionWrap-83'  class='   watupro-question-id-377255'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>83. <\/span>Which type of malware records user activities without their consent?<\/div><input type='hidden' name='question_id[]' id='qID_83' value='377255' \/><input type='hidden' id='answerType377255' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377255[]' id='answer-id-1468408' class='answer   answerof-377255 ' value='1468408'   \/><label for='answer-id-1468408' id='answer-label-1468408' class=' answer'><span>Trojans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377255[]' id='answer-id-1468409' class='answer   answerof-377255 ' value='1468409'   \/><label for='answer-id-1468409' id='answer-label-1468409' class=' answer'><span>Adware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377255[]' id='answer-id-1468410' class='answer   answerof-377255 ' value='1468410'   \/><label for='answer-id-1468410' id='answer-label-1468410' class=' answer'><span>Spyware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377255[]' id='answer-id-1468411' class='answer   answerof-377255 ' value='1468411'   \/><label for='answer-id-1468411' id='answer-label-1468411' class=' answer'><span>Worms<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-84' style=';'><div id='questionWrap-84'  class='   watupro-question-id-377256'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>84. <\/span>What is the main purpose of antivirus software?<\/div><input type='hidden' name='question_id[]' id='qID_84' value='377256' \/><input type='hidden' id='answerType377256' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377256[]' id='answer-id-1468412' class='answer   answerof-377256 ' value='1468412'   \/><label for='answer-id-1468412' id='answer-label-1468412' class=' answer'><span>To enhance system performance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377256[]' id='answer-id-1468413' class='answer   answerof-377256 ' value='1468413'   \/><label for='answer-id-1468413' id='answer-label-1468413' class=' answer'><span>To prevent and remove malware infections.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377256[]' id='answer-id-1468414' class='answer   answerof-377256 ' value='1468414'   \/><label for='answer-id-1468414' id='answer-label-1468414' class=' answer'><span>To encrypt sensitive data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377256[]' id='answer-id-1468415' class='answer   answerof-377256 ' value='1468415'   \/><label for='answer-id-1468415' id='answer-label-1468415' class=' answer'><span>To reduce the need for system backups.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-85' style=';'><div id='questionWrap-85'  class='   watupro-question-id-377257'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>85. <\/span>Which of the following is a characteristic of worms?<\/div><input type='hidden' name='question_id[]' id='qID_85' value='377257' \/><input type='hidden' id='answerType377257' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377257[]' id='answer-id-1468416' class='answer   answerof-377257 ' value='1468416'   \/><label for='answer-id-1468416' id='answer-label-1468416' class=' answer'><span>Requires user intervention to spread.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377257[]' id='answer-id-1468417' class='answer   answerof-377257 ' value='1468417'   \/><label for='answer-id-1468417' id='answer-label-1468417' class=' answer'><span>Replicates itself to spread across networks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377257[]' id='answer-id-1468418' class='answer   answerof-377257 ' value='1468418'   \/><label for='answer-id-1468418' id='answer-label-1468418' class=' answer'><span>Disguises itself as legitimate software.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377257[]' id='answer-id-1468419' class='answer   answerof-377257 ' value='1468419'   \/><label for='answer-id-1468419' id='answer-label-1468419' class=' answer'><span>Steals personal information via phishing.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-86' style=';'><div id='questionWrap-86'  class='   watupro-question-id-377258'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>86. <\/span>What is a Trojan horse in the context of malware?<\/div><input type='hidden' name='question_id[]' id='qID_86' value='377258' \/><input type='hidden' id='answerType377258' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377258[]' id='answer-id-1468420' class='answer   answerof-377258 ' value='1468420'   \/><label for='answer-id-1468420' id='answer-label-1468420' class=' answer'><span>A type of malware that spreads without user interaction.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377258[]' id='answer-id-1468421' class='answer   answerof-377258 ' value='1468421'   \/><label for='answer-id-1468421' id='answer-label-1468421' class=' answer'><span>Malware disguised as legitimate software.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377258[]' id='answer-id-1468422' class='answer   answerof-377258 ' value='1468422'   \/><label for='answer-id-1468422' id='answer-label-1468422' class=' answer'><span>A malicious program that targets network hardware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377258[]' id='answer-id-1468423' class='answer   answerof-377258 ' value='1468423'   \/><label for='answer-id-1468423' id='answer-label-1468423' class=' answer'><span>A virus embedded in hardware devices.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-87' style=';'><div id='questionWrap-87'  class='   watupro-question-id-377259'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>87. <\/span>Which two features are commonly found in antivirus software?<\/div><input type='hidden' name='question_id[]' id='qID_87' value='377259' \/><input type='hidden' id='answerType377259' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377259[]' id='answer-id-1468424' class='answer   answerof-377259 ' value='1468424'   \/><label for='answer-id-1468424' id='answer-label-1468424' class=' answer'><span>Real-time scanning and scheduled scans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377259[]' id='answer-id-1468425' class='answer   answerof-377259 ' value='1468425'   \/><label for='answer-id-1468425' id='answer-label-1468425' class=' answer'><span>Data encryption and physical security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377259[]' id='answer-id-1468426' class='answer   answerof-377259 ' value='1468426'   \/><label for='answer-id-1468426' id='answer-label-1468426' class=' answer'><span>Intrusion detection and firewall settings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377259[]' id='answer-id-1468427' class='answer   answerof-377259 ' value='1468427'   \/><label for='answer-id-1468427' id='answer-label-1468427' class=' answer'><span>Multi-factor authentication and password management<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-88' style=';'><div id='questionWrap-88'  class='   watupro-question-id-377260'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>88. <\/span>What should be done after installing antivirus software?<\/div><input type='hidden' name='question_id[]' id='qID_88' value='377260' \/><input type='hidden' id='answerType377260' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377260[]' id='answer-id-1468428' class='answer   answerof-377260 ' value='1468428'   \/><label for='answer-id-1468428' id='answer-label-1468428' class=' answer'><span>Disconnect the system from the internet.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377260[]' id='answer-id-1468429' class='answer   answerof-377260 ' value='1468429'   \/><label for='answer-id-1468429' id='answer-label-1468429' class=' answer'><span>Update the software and run a full system scan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377260[]' id='answer-id-1468430' class='answer   answerof-377260 ' value='1468430'   \/><label for='answer-id-1468430' id='answer-label-1468430' class=' answer'><span>Disable real-time scanning to improve performance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377260[]' id='answer-id-1468431' class='answer   answerof-377260 ' value='1468431'   \/><label for='answer-id-1468431' id='answer-label-1468431' class=' answer'><span>Perform a factory reset on the system.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-89' style=';'><div id='questionWrap-89'  class='   watupro-question-id-377261'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>89. <\/span>Which type of malware modifies its code to avoid detection?<\/div><input type='hidden' name='question_id[]' id='qID_89' value='377261' \/><input type='hidden' id='answerType377261' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377261[]' id='answer-id-1468432' class='answer   answerof-377261 ' value='1468432'   \/><label for='answer-id-1468432' id='answer-label-1468432' class=' answer'><span>Polymorphic malware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377261[]' id='answer-id-1468433' class='answer   answerof-377261 ' value='1468433'   \/><label for='answer-id-1468433' id='answer-label-1468433' class=' answer'><span>Spyware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377261[]' id='answer-id-1468434' class='answer   answerof-377261 ' value='1468434'   \/><label for='answer-id-1468434' id='answer-label-1468434' class=' answer'><span>Adware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377261[]' id='answer-id-1468435' class='answer   answerof-377261 ' value='1468435'   \/><label for='answer-id-1468435' id='answer-label-1468435' class=' answer'><span>Keylogger<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-90' style=';'><div id='questionWrap-90'  class='   watupro-question-id-377262'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>90. <\/span>Which of the following is a step to prevent malware infections? (Choose two)<\/div><input type='hidden' name='question_id[]' id='qID_90' value='377262' \/><input type='hidden' id='answerType377262' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377262[]' id='answer-id-1468436' class='answer   answerof-377262 ' value='1468436'   \/><label for='answer-id-1468436' id='answer-label-1468436' class=' answer'><span>Regularly update operating systems and software.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377262[]' id='answer-id-1468437' class='answer   answerof-377262 ' value='1468437'   \/><label for='answer-id-1468437' id='answer-label-1468437' class=' answer'><span>Avoid using antivirus software to reduce system overhead.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377262[]' id='answer-id-1468438' class='answer   answerof-377262 ' value='1468438'   \/><label for='answer-id-1468438' id='answer-label-1468438' class=' answer'><span>Open email attachments from unknown senders.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-377262[]' id='answer-id-1468439' class='answer   answerof-377262 ' value='1468439'   \/><label for='answer-id-1468439' id='answer-label-1468439' class=' answer'><span>Download software only from trusted sources.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-91' style=';'><div id='questionWrap-91'  class='   watupro-question-id-377263'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>91. <\/span>How does adware affect a system?<\/div><input type='hidden' name='question_id[]' id='qID_91' value='377263' \/><input type='hidden' id='answerType377263' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377263[]' id='answer-id-1468440' class='answer   answerof-377263 ' value='1468440'   \/><label for='answer-id-1468440' id='answer-label-1468440' class=' answer'><span>Encrypts system files until a ransom is paid.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377263[]' id='answer-id-1468441' class='answer   answerof-377263 ' value='1468441'   \/><label for='answer-id-1468441' id='answer-label-1468441' class=' answer'><span>Displays unwanted advertisements, sometimes compromising privacy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377263[]' id='answer-id-1468442' class='answer   answerof-377263 ' value='1468442'   \/><label for='answer-id-1468442' id='answer-label-1468442' class=' answer'><span>Deletes critical system files.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377263[]' id='answer-id-1468443' class='answer   answerof-377263 ' value='1468443'   \/><label for='answer-id-1468443' id='answer-label-1468443' class=' answer'><span>Modifies system settings to reduce performance.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-92' style=';'><div id='questionWrap-92'  class='   watupro-question-id-377264'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>92. <\/span>What is the first step in the process of installing antivirus software?<\/div><input type='hidden' name='question_id[]' id='qID_92' value='377264' \/><input type='hidden' id='answerType377264' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377264[]' id='answer-id-1468444' class='answer   answerof-377264 ' value='1468444'   \/><label for='answer-id-1468444' id='answer-label-1468444' class=' answer'><span>Running a full system scan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377264[]' id='answer-id-1468445' class='answer   answerof-377264 ' value='1468445'   \/><label for='answer-id-1468445' id='answer-label-1468445' class=' answer'><span>Checking the system for existing malware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377264[]' id='answer-id-1468446' class='answer   answerof-377264 ' value='1468446'   \/><label for='answer-id-1468446' id='answer-label-1468446' class=' answer'><span>Downloading the software from a trusted source.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377264[]' id='answer-id-1468447' class='answer   answerof-377264 ' value='1468447'   \/><label for='answer-id-1468447' id='answer-label-1468447' class=' answer'><span>Updating the software definitions.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-93' style=';'><div id='questionWrap-93'  class='   watupro-question-id-377265'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>93. <\/span>What is the primary difference between a virus and a worm?<\/div><input type='hidden' name='question_id[]' id='qID_93' value='377265' \/><input type='hidden' id='answerType377265' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377265[]' id='answer-id-1468448' class='answer   answerof-377265 ' value='1468448'   \/><label for='answer-id-1468448' id='answer-label-1468448' class=' answer'><span>A virus replicates only via user interaction, while a worm spreads automatically.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377265[]' id='answer-id-1468449' class='answer   answerof-377265 ' value='1468449'   \/><label for='answer-id-1468449' id='answer-label-1468449' class=' answer'><span>A virus targets hardware, while a worm targets networks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377265[]' id='answer-id-1468450' class='answer   answerof-377265 ' value='1468450'   \/><label for='answer-id-1468450' id='answer-label-1468450' class=' answer'><span>A virus encrypts data, while a worm deletes files.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377265[]' id='answer-id-1468451' class='answer   answerof-377265 ' value='1468451'   \/><label for='answer-id-1468451' id='answer-label-1468451' class=' answer'><span>A virus is easier to detect than a worm.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-94' style=';'><div id='questionWrap-94'  class='   watupro-question-id-377266'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>94. <\/span>What is the role of a quarantine feature in antivirus software?<\/div><input type='hidden' name='question_id[]' id='qID_94' value='377266' \/><input type='hidden' id='answerType377266' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377266[]' id='answer-id-1468452' class='answer   answerof-377266 ' value='1468452'   \/><label for='answer-id-1468452' id='answer-label-1468452' class=' answer'><span>Deleting all detected malware files.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377266[]' id='answer-id-1468453' class='answer   answerof-377266 ' value='1468453'   \/><label for='answer-id-1468453' id='answer-label-1468453' class=' answer'><span>Isolating suspicious files to prevent them from running.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377266[]' id='answer-id-1468454' class='answer   answerof-377266 ' value='1468454'   \/><label for='answer-id-1468454' id='answer-label-1468454' class=' answer'><span>Backing up infected files for recovery.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377266[]' id='answer-id-1468455' class='answer   answerof-377266 ' value='1468455'   \/><label for='answer-id-1468455' id='answer-label-1468455' class=' answer'><span>Encrypting files to protect them from malware.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-95' style=';'><div id='questionWrap-95'  class='   watupro-question-id-377267'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>95. <\/span>Which type of malware is designed to track keyboard input?<\/div><input type='hidden' name='question_id[]' id='qID_95' value='377267' \/><input type='hidden' id='answerType377267' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377267[]' id='answer-id-1468456' class='answer   answerof-377267 ' value='1468456'   \/><label for='answer-id-1468456' id='answer-label-1468456' class=' answer'><span>Ransomware<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377267[]' id='answer-id-1468457' class='answer   answerof-377267 ' value='1468457'   \/><label for='answer-id-1468457' id='answer-label-1468457' class=' answer'><span>Keylogger<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377267[]' id='answer-id-1468458' class='answer   answerof-377267 ' value='1468458'   \/><label for='answer-id-1468458' id='answer-label-1468458' class=' answer'><span>Worm<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377267[]' id='answer-id-1468459' class='answer   answerof-377267 ' value='1468459'   \/><label for='answer-id-1468459' id='answer-label-1468459' class=' answer'><span>Trojan horse<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-96' style=';'><div id='questionWrap-96'  class='   watupro-question-id-377268'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>96. <\/span>What is the purpose of real-time scanning in antivirus software?<\/div><input type='hidden' name='question_id[]' id='qID_96' value='377268' \/><input type='hidden' id='answerType377268' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377268[]' id='answer-id-1468460' class='answer   answerof-377268 ' value='1468460'   \/><label for='answer-id-1468460' id='answer-label-1468460' class=' answer'><span>To scan the system only during idle times.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377268[]' id='answer-id-1468461' class='answer   answerof-377268 ' value='1468461'   \/><label for='answer-id-1468461' id='answer-label-1468461' class=' answer'><span>To monitor and detect threats as they occur.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377268[]' id='answer-id-1468462' class='answer   answerof-377268 ' value='1468462'   \/><label for='answer-id-1468462' id='answer-label-1468462' class=' answer'><span>To analyze encrypted files for malware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377268[]' id='answer-id-1468463' class='answer   answerof-377268 ' value='1468463'   \/><label for='answer-id-1468463' id='answer-label-1468463' class=' answer'><span>To speed up the system\u2019s processing time.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-97' style=';'><div id='questionWrap-97'  class='   watupro-question-id-377269'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>97. <\/span>Which two steps should be taken to ensure antivirus effectiveness?<\/div><input type='hidden' name='question_id[]' id='qID_97' value='377269' \/><input type='hidden' id='answerType377269' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377269[]' id='answer-id-1468464' class='answer   answerof-377269 ' value='1468464'   \/><label for='answer-id-1468464' id='answer-label-1468464' class=' answer'><span>Schedule regular scans and keep software updated.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377269[]' id='answer-id-1468465' class='answer   answerof-377269 ' value='1468465'   \/><label for='answer-id-1468465' id='answer-label-1468465' class=' answer'><span>Disable real-time protection and use manual scans.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377269[]' id='answer-id-1468466' class='answer   answerof-377269 ' value='1468466'   \/><label for='answer-id-1468466' id='answer-label-1468466' class=' answer'><span>Remove software firewalls and enable default settings.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377269[]' id='answer-id-1468467' class='answer   answerof-377269 ' value='1468467'   \/><label for='answer-id-1468467' id='answer-label-1468467' class=' answer'><span>Install multiple antivirus programs for redundancy.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-98' style=';'><div id='questionWrap-98'  class='   watupro-question-id-377270'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>98. <\/span>What is the primary risk of not updating antivirus software regularly?<\/div><input type='hidden' name='question_id[]' id='qID_98' value='377270' \/><input type='hidden' id='answerType377270' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377270[]' id='answer-id-1468468' class='answer   answerof-377270 ' value='1468468'   \/><label for='answer-id-1468468' id='answer-label-1468468' class=' answer'><span>Slower system performance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377270[]' id='answer-id-1468469' class='answer   answerof-377270 ' value='1468469'   \/><label for='answer-id-1468469' id='answer-label-1468469' class=' answer'><span>Inability to detect new types of malware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377270[]' id='answer-id-1468470' class='answer   answerof-377270 ' value='1468470'   \/><label for='answer-id-1468470' id='answer-label-1468470' class=' answer'><span>Reduced file storage capacity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377270[]' id='answer-id-1468471' class='answer   answerof-377270 ' value='1468471'   \/><label for='answer-id-1468471' id='answer-label-1468471' class=' answer'><span>Increased encryption overhead.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-99' style=';'><div id='questionWrap-99'  class='   watupro-question-id-377271'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>99. <\/span>What is the best method to remove stubborn malware from a system?<\/div><input type='hidden' name='question_id[]' id='qID_99' value='377271' \/><input type='hidden' id='answerType377271' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377271[]' id='answer-id-1468472' class='answer   answerof-377271 ' value='1468472'   \/><label for='answer-id-1468472' id='answer-label-1468472' class=' answer'><span>Reinstalling the operating system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377271[]' id='answer-id-1468473' class='answer   answerof-377271 ' value='1468473'   \/><label for='answer-id-1468473' id='answer-label-1468473' class=' answer'><span>Running an antivirus scan in safe mode.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377271[]' id='answer-id-1468474' class='answer   answerof-377271 ' value='1468474'   \/><label for='answer-id-1468474' id='answer-label-1468474' class=' answer'><span>Disabling internet connectivity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377271[]' id='answer-id-1468475' class='answer   answerof-377271 ' value='1468475'   \/><label for='answer-id-1468475' id='answer-label-1468475' class=' answer'><span>Restarting the system in normal mode.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-100' style=';'><div id='questionWrap-100'  class='   watupro-question-id-377272'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>100. <\/span>Which two factors improve antivirus software efficiency?<\/div><input type='hidden' name='question_id[]' id='qID_100' value='377272' \/><input type='hidden' id='answerType377272' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377272[]' id='answer-id-1468476' class='answer   answerof-377272 ' value='1468476'   \/><label for='answer-id-1468476' id='answer-label-1468476' class=' answer'><span>Frequent updates and real-time protection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377272[]' id='answer-id-1468477' class='answer   answerof-377272 ' value='1468477'   \/><label for='answer-id-1468477' id='answer-label-1468477' class=' answer'><span>Increased CPU performance and reduced scans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377272[]' id='answer-id-1468478' class='answer   answerof-377272 ' value='1468478'   \/><label for='answer-id-1468478' id='answer-label-1468478' class=' answer'><span>Uninstalling unused software and firewalls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-377272[]' id='answer-id-1468479' class='answer   answerof-377272 ' value='1468479'   \/><label for='answer-id-1468479' id='answer-label-1468479' class=' answer'><span>Disabling non-essential system processes<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-101'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons9434\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"9434\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-05 14:31:42\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1777991502\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"377173:1468080,1468081,1468082,1468083 | 377174:1468084,1468085,1468086,1468087 | 377175:1468088,1468089,1468090,1468091 | 377176:1468092,1468093,1468094,1468095 | 377177:1468096,1468097,1468098,1468099 | 377178:1468100,1468101,1468102,1468103 | 377179:1468104,1468105,1468106,1468107 | 377180:1468108,1468109,1468110,1468111 | 377181:1468112,1468113,1468114,1468115 | 377182:1468116,1468117,1468118,1468119 | 377183:1468120,1468121,1468122,1468123 | 377184:1468124,1468125,1468126,1468127 | 377185:1468128,1468129,1468130,1468131 | 377186:1468132,1468133,1468134,1468135 | 377187:1468136,1468137,1468138,1468139 | 377188:1468140,1468141,1468142,1468143 | 377189:1468144,1468145,1468146,1468147 | 377190:1468148,1468149,1468150,1468151 | 377191:1468152,1468153,1468154,1468155 | 377192:1468156,1468157,1468158,1468159 | 377193:1468160,1468161,1468162,1468163 | 377194:1468164,1468165,1468166,1468167 | 377195:1468168,1468169,1468170,1468171 | 377196:1468172,1468173,1468174,1468175 | 377197:1468176,1468177,1468178,1468179 | 377198:1468180,1468181,1468182,1468183 | 377199:1468184,1468185,1468186,1468187 | 377200:1468188,1468189,1468190,1468191 | 377201:1468192,1468193,1468194,1468195 | 377202:1468196,1468197,1468198,1468199 | 377203:1468200,1468201,1468202,1468203 | 377204:1468204,1468205,1468206,1468207 | 377205:1468208,1468209,1468210,1468211 | 377206:1468212,1468213,1468214,1468215 | 377207:1468216,1468217,1468218,1468219 | 377208:1468220,1468221,1468222,1468223 | 377209:1468224,1468225,1468226,1468227 | 377210:1468228,1468229,1468230,1468231 | 377211:1468232,1468233,1468234,1468235 | 377212:1468236,1468237,1468238,1468239 | 377213:1468240,1468241,1468242,1468243 | 377214:1468244,1468245,1468246,1468247 | 377215:1468248,1468249,1468250,1468251 | 377216:1468252,1468253,1468254,1468255 | 377217:1468256,1468257,1468258,1468259 | 377218:1468260,1468261,1468262,1468263 | 377219:1468264,1468265,1468266,1468267 | 377220:1468268,1468269,1468270,1468271 | 377221:1468272,1468273,1468274,1468275 | 377222:1468276,1468277,1468278,1468279 | 377223:1468280,1468281,1468282,1468283 | 377224:1468284,1468285,1468286,1468287 | 377225:1468288,1468289,1468290,1468291 | 377226:1468292,1468293,1468294,1468295 | 377227:1468296,1468297,1468298,1468299 | 377228:1468300,1468301,1468302,1468303 | 377229:1468304,1468305,1468306,1468307 | 377230:1468308,1468309,1468310,1468311 | 377231:1468312,1468313,1468314,1468315 | 377232:1468316,1468317,1468318,1468319 | 377233:1468320,1468321,1468322,1468323 | 377234:1468324,1468325,1468326,1468327 | 377235:1468328,1468329,1468330,1468331 | 377236:1468332,1468333,1468334,1468335 | 377237:1468336,1468337,1468338,1468339 | 377238:1468340,1468341,1468342,1468343 | 377239:1468344,1468345,1468346,1468347 | 377240:1468348,1468349,1468350,1468351 | 377241:1468352,1468353,1468354,1468355 | 377242:1468356,1468357,1468358,1468359 | 377243:1468360,1468361,1468362,1468363 | 377244:1468364,1468365,1468366,1468367 | 377245:1468368,1468369,1468370,1468371 | 377246:1468372,1468373,1468374,1468375 | 377247:1468376,1468377,1468378,1468379 | 377248:1468380,1468381,1468382,1468383 | 377249:1468384,1468385,1468386,1468387 | 377250:1468388,1468389,1468390,1468391 | 377251:1468392,1468393,1468394,1468395 | 377252:1468396,1468397,1468398,1468399 | 377253:1468400,1468401,1468402,1468403 | 377254:1468404,1468405,1468406,1468407 | 377255:1468408,1468409,1468410,1468411 | 377256:1468412,1468413,1468414,1468415 | 377257:1468416,1468417,1468418,1468419 | 377258:1468420,1468421,1468422,1468423 | 377259:1468424,1468425,1468426,1468427 | 377260:1468428,1468429,1468430,1468431 | 377261:1468432,1468433,1468434,1468435 | 377262:1468436,1468437,1468438,1468439 | 377263:1468440,1468441,1468442,1468443 | 377264:1468444,1468445,1468446,1468447 | 377265:1468448,1468449,1468450,1468451 | 377266:1468452,1468453,1468454,1468455 | 377267:1468456,1468457,1468458,1468459 | 377268:1468460,1468461,1468462,1468463 | 377269:1468464,1468465,1468466,1468467 | 377270:1468468,1468469,1468470,1468471 | 377271:1468472,1468473,1468474,1468475 | 377272:1468476,1468477,1468478,1468479\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"377173,377174,377175,377176,377177,377178,377179,377180,377181,377182,377183,377184,377185,377186,377187,377188,377189,377190,377191,377192,377193,377194,377195,377196,377197,377198,377199,377200,377201,377202,377203,377204,377205,377206,377207,377208,377209,377210,377211,377212,377213,377214,377215,377216,377217,377218,377219,377220,377221,377222,377223,377224,377225,377226,377227,377228,377229,377230,377231,377232,377233,377234,377235,377236,377237,377238,377239,377240,377241,377242,377243,377244,377245,377246,377247,377248,377249,377250,377251,377252,377253,377254,377255,377256,377257,377258,377259,377260,377261,377262,377263,377264,377265,377266,377267,377268,377269,377270,377271,377272\";\nWatuPROSettings[9434] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 9434;\t    \nWatuPRO.post_id = 96640;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.32676600 1777991502\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(9434);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Try 100% exact 112-12 dumps of DumpsBase now, we guarantee that you can clear your Certified Secure Computer User (CSCU) certification exam smoothly. Professionals choose to be a Certified Secure Computer User to demonstrate their knowledge and skills to protect their information assets. With this CSCU certification, they are introduced to various computer and network [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18447,119],"tags":[18448,18449],"class_list":["post-96640","post","type-post","status-publish","format-standard","hentry","category-cscu-certification","category-ec-council","tag-112-12-dumps","tag-certified-secure-computer-user-cscu"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/96640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=96640"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/96640\/revisions"}],"predecessor-version":[{"id":96642,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/96640\/revisions\/96642"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=96640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=96640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=96640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}