Cybersecurity Architecture & Engineering Newest
2025/2026 Complete All 230 Questions And Correct
Detailed Answers |Already Graded A+||Already Graded
A+
1. A company is looking to protect sensitive data stored on its storage devices and
ensure that this data is secure from unauthorized access. The company is
looking for a solution that provides a high level of security and protection for its
data. Which security technology will protect sensitive data stored on the
company's storage devices by automatically initiating security procedures as
they are written to the device?
A Self-encrypting drives
B - Hardware security module (HSM)
C- Two-factor authentication
D- Measured boot - ANSWER-A- Self-encrypting drives
2. A company is concerned about advanced persistent threats and targeted attacks
on its computer systems. The company wants to implement a security solution
that can detect and respond to any suspicious activity on its systems. Which
security technology meets the needs of this company?
A - Endpoint detection and response (EDR) software
B - Hardware security module (HSM)
C - Two-factor authentication
D - Antivirus tools - ANSWER-A - Endpoint detection and response (EDR)
software
,3. An enterprise is deploying a new software application that requires a
cryptographic protocol to secure data transmission. The application will be used
to process sensitive customer information, and the company wants to ensure
that the data is protected during transmission. Which cryptographic protocol
meets the needs of the enterprise?
A - Point-to-Point Tunneling Protocol (PPTP) with Triple Data Encryption
Standard (3DES)
B - Secure Sockets Layer (SSL) with Data Encryption Standard (DES)
C- Transport Layer Security (TLS) with Advanced Encryption Standard (AES)
D - Hypertext Transfer Protocol Secure (HTTPS) with Rivest- Shamir-Adleman
(RSA) - ANSWER-C-Transport Layer Security (TLS) with Advanced Encryption
Standard (AES)
4. Which emerging technology has the potential to significantly impact the
security of current encryption methods by making it possible to quickly solve
mathematical problems that are currently considered difficult or impossible to
solve?
A - Blockchain
B - Quantum computing
C - Artificial intelligence (AI)
D - Augmented reality (AR) - ANSWER-B - Quantum computing
Which public-key cryptosystem uses prime factorization as the basis for its
security?
A - Rivest-Shamir-Adleman (RSA)
B - Digital Signature Algorithm (DSA)
C - Elliptic Curve Digital Signature Algorithm (ECDSA)
D - Diffie-Hellman (DH) - ANSWER-A - Rivest-Shamir-
,5. Which key exchange algorithm is used to establish a shared secret key between
two parties without the need for a pre-shared secret or public key exchange?
A-Diffie-Hellman (DH)
B - Rivest-Shamir-Adleman (RSA)
C - Digital Signature Algorithm (DSA)
D - Elliptic Curve Diffie-Hellman (ECDH) - ANSWER-A- Diffie-Hellman (DH)
6. The company plans to deploy a cryptographic system for their digital
signatures, which employs a public key cryptosystem that is based on figures
described by the equation y^2 = x^3+ ax + b. Which public-key cryptosystem
does this describe?
A - Digital Signature Algorithm (DSA)
B - Rivest-Shamir-Adleman (RSA)
C - Elliptic Curve Digital Signature Algorithm (ECDSA)
D - Diffie-Hellman (DH) - ANSWER-C - Elliptic Curve Digital Signature
Algorithm (ECDSA)
7. A company operates a customer service call center with over one hundred
agents taking inbound sales calls. After a recent security breach, the security
team believes that one or more agents have been stealing customer credit card
details. Which solution will defend against this issue?
A Security information and event management (SIEM)
B File integrity monitoring (FIM)
C - Data loss prevention (DLP)
D - Intrusion detection system (IDS) – ANSWER C-Data loss prevention (DLP)
, 8. The security team has noticed that several endpoints on the network have been
infected with malware. Leadership has tasked the security team with identifying
these attacks in the future. Which solution will notify the team automatically in
the event of future malware variants invading the network?
A - Security information and event management (SIEM) alerts
B - Data loss prevention (DLP) alerts
C - Antivirus alerts
D - Syslog alerts - ANSWER-Antivirus alerts
9. An engineer has noticed a degradation in system performance and alerts
regarding high central processing unit (CPU) usage on multiple virtual
machines in the environment. Further investigation shows that several unknown
processes are running on the affected systems. What is the explanation for the
degradation in system performance and alerts regarding high central processing
unit (CPU) usage?
A-Misconfigured firewall
B - Overly permissive web application firewall (WAF) rules
C - Outdated anti-malware signatures
D - Incorrect file permissions - ANSWER-Outdated anti-malware signatures
10.A financial services company has experienced several incidents of data
breaches in recent months. The company has analyzed the indicators of
compromise and determined that the data decided to implement hardening
techniques and endpoint security controls to mitigate the risk. What should be