SANS SEC 301 COMPREHENSIVE STUDY
GUIDE 2026 FULL QUESTIONS AND
SOLUTIONS GRADED A+
>> Jailbreaking
Answer: Removing iOS restrictions
>> Rooting
Answer: Gaining Android administrative access
>> Mobile Malware
Answer: Malware targeting mobile devices
>> Sideloading
Answer: Installing apps from unofficial sources
>> Geofencing
Answer: Location-based restrictions
>> Remote Wipe
Answer: Deleting device data remotely
>> Device Encryption
Answer: Encrypting mobile storage
>> Biometric Security
Answer: Using fingerprints or face recognition
, >> IoT Security
Answer: Protecting Internet of Things devices
>> Embedded Systems
Answer: Specialized computer systems
>> Firmware
Answer: Permanent software in devices
>> SCADA
Answer: Supervisory Control and Data Acquisition
>> Industrial Control Systems (ICS)
Answer: Systems controlling industrial processes
>> Operational Technology (OT)
Answer: Industrial hardware and software
>> Air Gap
Answer: Physical network isolation
>> Supply Chain Security
Answer: Protecting vendor relationships
>> Third-Party Risk
Answer: Security risks from vendors
>> Vendor Management
Answer: Overseeing vendor security
GUIDE 2026 FULL QUESTIONS AND
SOLUTIONS GRADED A+
>> Jailbreaking
Answer: Removing iOS restrictions
>> Rooting
Answer: Gaining Android administrative access
>> Mobile Malware
Answer: Malware targeting mobile devices
>> Sideloading
Answer: Installing apps from unofficial sources
>> Geofencing
Answer: Location-based restrictions
>> Remote Wipe
Answer: Deleting device data remotely
>> Device Encryption
Answer: Encrypting mobile storage
>> Biometric Security
Answer: Using fingerprints or face recognition
, >> IoT Security
Answer: Protecting Internet of Things devices
>> Embedded Systems
Answer: Specialized computer systems
>> Firmware
Answer: Permanent software in devices
>> SCADA
Answer: Supervisory Control and Data Acquisition
>> Industrial Control Systems (ICS)
Answer: Systems controlling industrial processes
>> Operational Technology (OT)
Answer: Industrial hardware and software
>> Air Gap
Answer: Physical network isolation
>> Supply Chain Security
Answer: Protecting vendor relationships
>> Third-Party Risk
Answer: Security risks from vendors
>> Vendor Management
Answer: Overseeing vendor security