2026 UPDATE | 100% CORRECT
You have excellent technical acumen. Part of your responsibilities where you
work include overlooking daily operations as well as analyzing and designing
security solutions in a specific area. You encounter a situation that needs to be
escalated. Which of the following are you most likely to approach with the
situation? Answer - Security manager
When analyzing a security breach, Acer determines the attacker was able to
change the price of an item from $200 to $20. What security protection was
compromised? Answer - Integrity
A visitor is trying to access a military base. The visitor needs to supply their
license and enter other personal information via a kiosk. The visitor is
eventually allowed to enter the base but is limited to certain areas only. What
security principles are being employed? Select two. Answer - Authentication
Authorization
Which of the following best describes what Della could do to prevent
unauthorized parties from viewing sensitive customer information at her retail
store? Answer - Use software to encrypt data in a secure database.
Evin thinks one of the computer systems where he works may have been
compromised. He does not currently have a good way of determining if an
unauthorized user logged in successfully. Which of the following can Evin
, implement that will, going forward, help him identify who logs in? Answer -
Accounting
A friend gets a virus and asks if you can help them fix the problem. You boot
the computer with a bootable flash drive containing security-related tools and
remove the virus. What type of control did you employ? Answer - Corrective
As a consultant, you are asked by a company to help them work on a security-
related project that falls under the operational control scope. Which of the
following will you help implement? Answer - Implement security awareness
training
Which of the following best describes the differences or similarities between
cybersecurity and information security? Select three. Answer - Information
security falls under the cybersecurity umbrella.
Cybersecurity primarily protects devices.
Information security protects using products, people, and procedures.
What type of entity would a threat actor most likely attack to steal design
documents for a relatively recently announced government-issued contract to
design and build a missile defense system? Answer - Enterprise
An attacker hacks into a cell phone with the intent of stealing credit card
information. The attacker also tries to extend the nefarious activity to contacts
in the victim's phone, and their contacts as well. What entity was the attacker
targeting? Answer - An individual
A malicious actor lacking technical knowledge uses an attack tool to perform a
sophisticated attack. If the attacker is successful penetrating the defenses of
the targeted organization, what type of activity are they most likely to
perform? Select two. Answer - Copy data