Questions with A level solution version 2025/2026
Which of the following is NOT a component of a cipher suite used by TLS? - correct
answer rotation cipher
What is the database used to interpret the details of SNMP communications? - correct
answer MIB - Management Information Base
How are managerial controls used to encourage compliance typically categorized? -
correct answer Directive
Which of the following network topologies offers the most redundancy and the greatest
speed? - correct answer Mesh
How does a web of trust model provide security since it does not involve a trusted third-
party? - correct answer Through consistency of serial numbers of self-issued
certificates
You have been asked to help design the security awareness and training program for
your company. Which of the following statements is NOT true regarding this program? -
correct answer Specialized technical training should be provided for executives.
Which of the following options describes integrity? - correct answer Preservation of
internal and external consistency
What component of an incident response policy clearly defines the laws and regulations
that must be followed within the organization? - correct answer Standards Policy
How can organizations benefit from converged network communications? - correct
answer Reduced number of solution vendors and protocols
, Which of the following are security log event severity levels? (Choose all that apply.) -
correct answer Debug
Notice
Alert
Warning
Critical
Emergency
Error
How does an attribute-based access control system determine if a subject can access
an object? - correct answer It assesses the characteristics of the subject, object,
and/or environment.
How does S/MIME provide for verification that a received message was not modified
during transit? - correct answer Through a digital signature
How can someone new to the concept of virtualization quickly get a working guest OS
running within a hypervisor? - correct answer Use an appliance
A Web service has been experiencing a significant increase in traffic due to a successful
media announcement. However, in the chaos of new customers and an avalanche of
orders, the site manager forgot to address the Web site's digital certificate. At this point,
what process can the site manager perform to reuse his expired certificate? - correct
answer Reissue
Which IAM policy is applied directly to a user to control their permissions? - correct
answer Identity-based
An organization wants to host the master keys used by Oracle Transparent Data
Encryption (TDE) in AWS. Which type of customer-managed keys in Key Management
Service (KMS) should be used? - correct answer Symmetric keys with custom key
store