2026 VERIFIED QUESTIONS AND
SOLUTIONS
◉Preparation in incident response. Answer: creating policies and
procedures
◉Detection in incident response. Answer: Using tools and humans to
decide if an incident is an incident
◉Defense in Depth. Answer: employing multiple layers of controls to
avoid a single point of failure
◉Identify types of controls to mitigate risk. Answer: physical, logical,
administrative
◉Identify elements of risk management in policies and procedures..
Answer: Development of robust policies
Identification of emergent recent
Identify elements of internal weakness
, ◉Identify the layers of a defense-in-depth strategy.. Answer:
External network
Internal network
Host
Application
Data
◉Define identification. Answer: The claim of who we/networks are
◉Define identity verification.. Answer: Someone claims who they
are and you take it one step father and ask for ID
◉Define authentication. Answer: A set of methods used to
determine if a claim of identity is true.
◉Compare authentication types.. Answer: Multifactor
authentication
Mutual authentication
◉Identify password security best practices.. Answer: Upper case
Lower case
Numbers
Symbols