2026 COMPLETE QUESTIONS AND
CORRECT ANSWERS
◉Data Loss Prevention (DLP). Answer: System capabilities to detect
and prevent unauthorized use and transmission of information
◉Decryption. Answer: Process of converting ciphertext back into
plaintext using the appropriate key
◉De-encapsulation. Answer: Process of unpacking or revealing
bundled data
◉Defense in Depth. Answer: Information security strategy with
multiple layers of controls
◉Degaussing. Answer: Technique to erase data on disk or tape by
removing magnetic remanence
◉Denial of Service (DoS). Answer: Prevention of authorized access
or time-critical operations
, ◉Digital Signature. Answer: Transformation of data providing origin
authentication, data integrity, and non-repudiation
◉Disaster Recovery (DR). Answer: Activities to restore IT and
communications services during and after an outage
◉Disaster Recovery Plan (DRP). Answer: Instructions for recovering
critical business functions after a disruption
◉Discretionary Access Control (DAC). Answer: Access control
determined by the object's owner
◉Domain Name Service (DNS). Answer: Service, server, and protocol
for translating domain names to IP addresses
◉Egress. Answer: Monitoring outgoing network traffic
◉Encapsulation. Answer: Enforcement of data and code hiding
during software development and use
◉Encrypt. Answer: Protect private information by converting it into
a form only readable by authorized users