STUDY GUIDE 2026 VERIFIED ANSWERS
◉ Which of the following best represents activities typically
included in the patch management lifecycle? Answer: Asset
discovery, Vulnerability discovery, Patch acquisition, Patch
Validation, Patch deployment, reporting
◉ Bob and Alice share a job. To prevent fraud, Bob performs part A
and Alice performs part B, but because of their account privileges,
neither Bob nor Alice can perform the other's part. This is an
example of what concept? Answer: Segregation of duties
◉ An organization is utilizing a third-party web-based email service
for their corporate email. Which of the following types of cloud
service model is being utilized? Answer: Software as a Service (SaaS)
◉ Which of the following items best describes the topic of integrity?
Answer: The accuracy and consistency of data and systems
◉ When Preparing for threats posed by criminal groups, which of
the following is common characteristic to remember about such
groups? Answer: They engage in the same activities as individual
hackers such as extortion and theft.
, ◉ Which of the following is a physical security measure used to
prevent someone from accessing a certain area? Answer: Fence
◉ Which of the following is the primary objective of business
continuity manangement? Answer: To resume normal business
operations after an incident or disaster.
◉ Which of the following is a characteristic of mandatory access
control (MAC)? Answer: Access control based on an individual's
security clearance
◉ Which of the following is a characteristic of discretionary access
control (DAC)? Answer: Access control determined by the owner or
custodian or the resource
◉ Which part of the access control mechanism provides information
used by auditors and investigators? Answer: Accountability
◉ Of the choices listed which quantitative measure indicates how
much money an organization is predicted to lose if a given threat
event occurs one time? Answer: Single Loss Expectancy
◉ Which of the following best describes DAC Answer: Access control
model that provides the owner of the resource (typically the