2026 COMPLETE SOLUTION SET
◉ Tanja is designing a backup strategy for her organization's file
server. She would like to perform a backup every weekday that has
the smallest possible storage footprint. What type of backup should
she perform?
A. Incremental backup
B. Full Backup
C. Differenctial Backup
D. Transaction Log Backup. Answer: A. Incremental backup
Incremental backups provide the option that includes the smallest
amount of data. In this case, that would be only the data modified
since the most recent incremental backup, making it the correct
answer.
◉ Which of the following types of agreements is the MOST formal
document that contains expectations about availability and other
performance parameters between a service provider and a
customer?
A. Service Level Agreement (SLA)
B. Operational Level Agreement (OLA)
C. Memorandum of Understanding (MOU)
,D. Statement of Work (SOW). Answer: A. Service Level Agreement
(SLA)
The service level agreement is between a service provider and a
customer and documents in a formal manner expectations around
availability, performance, and other parameters.
◉ Which of the following is a feature of the rule based access
control?
A. The use of profile
B. The use of information flow label
C. the use of data flow diagram
D. The use of token. Answer: A. The use of profile
Rule based access control is based on a specific profile for each user
profile
◉ Which of the following attacks cold be the MOST successful when
the security technology is properly implemented and configured?
A. Logical attacks
B. Physical attacks
C. Social Engineering attacks
D. Trojan Horse attacks. Answer: C. Social Engineering attacks
Social Engineering attacks - in computer security systems, this type
of attack is usually the most successful, especially when the security
,technology is properly implemented and configured. Usually, these
attacks rely on the faults in human beings.
◉ What are the primary approaches IDS takes to analyze events to
detect attacks?
A. Misuse detection and anomaly detection.
B. Log detection and anomaly detection.
C. Misuse detection and early drop detection.
D. Scan detection and anomaly detection.. Answer: A. Misuse
detection and anomaly detection.
There are two primary approaches to analyzing events to detect
attacks; misuse detection and anomaly detection. Misuse detection,
in which the analysis targets something known to be "bad", is the
technique used by most commercial systems. Anomaly detection, in
which the analysis looks for abnormal patterns of activity
◉ What encryption algorithm is BEST suited for communication
with handheld wireless devices?
A. ECC
B. RSA
C. SHA
D. RC4. Answer: A. ECC
One differing factor is ECC's efficiency.
, ◉ Which of the following layers supervises the control rate of packet
transfers in an open systems interconnection (OSI) Implementation?
A. Physical
B. Session
C. Transport
D. Network. Answer: C. Transport
It is responsible for maintaining the end-to-end integrity and control
of the session.
◉ Which of the following is responsible for the MOST security
issues?
A. Outside espionage
B. Hackers
C. Personnel
D. Equipment failure. Answer: C. Personnel
◉ Which of the following is a DISADVANTAGE of a memory only
card?
A. High cost to develop
B. High cost to operate
C. Physically infeasible
D. Easy to counterfeit. Answer: D. Easy to counterfeit