Professional Documents
Culture Documents
Computer Networks
Computer Networks
Computer Networks
a system or network?
A) Phishing
B) Software patching
C) Encryption
D) Firewall configuration
Answer: A) Phishing
Explanation: Phishing is a common social engineering technique used by attackers to trick
individuals into divulging sensitive information such as usernames, passwords, or financial
data. Attackers often masquerade as trustworthy entities through emails, instant messages, or
fake websites to deceive users into clicking on malicious links or providing confidential
information.
Question 2: Which of the following best describes the principle of least privilege in
cybersecurity?
A) Providing users with the maximum level of access rights to enhance productivity.
B) Granting access to resources based on a user's job role or function to minimize potential
damage from security breaches.
C) Allowing unrestricted access to all network resources to simplify administration.
D) Using multiple layers of security controls to protect sensitive information.