PACK 2026 FULLY SOLVED MATERIAL
◉ What technology is used to implement confidentiality. Answer:
auditing
◉ Which of the following makes sure that data is not changed when
it not supposed
Confidentiality
Integrity
Availability
Accounting. Answer: integrity
◉ Which of the following is not a response when dealing with a risk
Avoidance
Mitigation
Transfer
Patching. Answer: patching
, ◉ What do you call the security discipline that requires that a user is
given no more privilege necessary to perform his or her job. Answer:
principle of least privilege
◉ What do you call the scope that hacker can use to break into a
system. Answer: attack surface
◉ What method used by hackers relies on the trusting nature of the
person being attacked. Answer: social engineering
◉ What is the best way to protect against social engineering.
Answer: employee awareness
◉ What is needed to highly secure a system. Answer: more money
◉ What is the first line of defense when setting up a network.
Answer: physically secure the network
◉ Which concept determines what resources users can access after
they log on. Answer: access control
◉ What is used to provide protection when one line of defense is
breached. Answer: defense in depth