Which of the following is a countermeasure?

Prepare effectively for the DSAC Annex F Test. Utilize flashcards and multiple-choice questions featuring hints and explanations. Excel in your exam!

Multiple Choice

Which of the following is a countermeasure?

Explanation:
A countermeasure is a protective control that reduces risk by preventing or mitigating threats. Encryption and decryption programs serve as a strong countermeasure because they render data unreadable to anyone without the proper key. When data is encrypted, even if it’s intercepted or accessed by an unauthorized party, the information remains meaningless without the decryption key. This protects both data at rest and data in transit, helping maintain confidentiality and integrity. Strong encryption relies on good algorithms and solid key management; weak keys or poor handling can undermine the protection. By comparison, weak passwords are a vulnerability that makes it easier for attackers to gain access; unsecured Wi‑Fi creates opportunities for interception and tampering of network traffic; and social engineering is a tactic attackers use to bypass controls by manipulating people rather than technical protections. Encryption directly addresses data protection, making it the best choice as a countermeasure.

A countermeasure is a protective control that reduces risk by preventing or mitigating threats. Encryption and decryption programs serve as a strong countermeasure because they render data unreadable to anyone without the proper key. When data is encrypted, even if it’s intercepted or accessed by an unauthorized party, the information remains meaningless without the decryption key. This protects both data at rest and data in transit, helping maintain confidentiality and integrity. Strong encryption relies on good algorithms and solid key management; weak keys or poor handling can undermine the protection.

By comparison, weak passwords are a vulnerability that makes it easier for attackers to gain access; unsecured Wi‑Fi creates opportunities for interception and tampering of network traffic; and social engineering is a tactic attackers use to bypass controls by manipulating people rather than technical protections. Encryption directly addresses data protection, making it the best choice as a countermeasure.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy