100 160
100 160
com
The safer , easier way to help you pass any IT exams.
Exam : 100-160
Version : DEMO
1 / 4
The safer , easier way to help you pass any IT exams.
1.What is a common security threat in which an attacker attempts to overwhelm a targeted system by
flooding it with Internet traffic?
A. Ransomware
B. Distributed Denial of Service (DDoS) attack
C. Phishing
D. SQL injection
Answer: B
Explanation:
Option 1: Ransomware is a type of malicious software that encrypts a victim's files and demands a
ransom in exchange for the decryption key. While it can cause damage to systems, it is not specifically
designed to overwhelm a system with Internet traffic.
Option 2: Correct. A Distributed Denial of Service (DDoS) attack is a common security threat in which an
attacker attempts to overwhelm a targeted system by flooding it with Internet traffic. This can result in a
loss of service availability for legitimate users.
Option 3: Phishing is a type of social engineering attack in which an attacker masquerades as a
trustworthy entity to trick individuals into providing sensitive information. It does not involve
overwhelming a system with Internet traffic.
Option 4: SQL injection is a type of web application attack in which an attacker manipulates a SQL query
to gain unauthorized access to a database. It does not involve overwhelming a system with Internet
traffic.
3.Which of the following services or protocols can be used to ensure the security and compliance of an
organization's network?
2 / 4
The safer , easier way to help you pass any IT exams.
4.Which network security feature helps protect against unauthorized data access and ensures
confidentiality of sensitive information?
A. Firewall
B. VPN
C. Intrusion Detection System
D. Antivirus
Answer: B
Explanation:
Option 1: Incorrect. A firewall is responsible for controlling incoming and outgoing network traffic based
on predetermined security rules. While it can help protect against unauthorized access, it does not
specifically ensure confidentiality of sensitive information.
Option 2: Correct. A VPN (Virtual Private Network) creates a secure, encrypted connection between a
user's device and a private network, such as a corporate network, over the internet. This helps protect
against unauthorized data access and ensures the confidentiality of sensitive information.
Option 3: Incorrect. An Intrusion Detection System (IDS) monitors network traffic for suspicious activity or
known attack patterns.
While it can help detect and alert to potential unauthorized access attempts, it does not specifically
ensure confidentiality of sensitive information.
Option 4: Incorrect. An antivirus software is used to detect, prevent, and remove malware infections.
While it can help protect against unauthorized access, it does not specifically ensure confidentiality of
sensitive information.
3 / 4
The safer , easier way to help you pass any IT exams.
4 / 4