CS4451 MODULE 1 EXAM QUESTIONS
AND ANSWERS GRADED A+ 2026
You have excellent technical acumen. Part of your responsibilities where you work include
overlooking daily operations as well as analyzing and designing security solutions in a specific
area. You encounter a situation that needs to be escalated. Which of the following are you most
likely to approach with the situation? - ANS Security manager
When analyzing a security breach, Acer determines the attacker was able to change the price of
an item from $200 to $20. What security protection was compromised? - ANS Integrity
A visitor is trying to access a military base. The visitor needs to supply their license and enter
other personal information via a kiosk. The visitor is eventually allowed to enter the base but is
limited to certain areas only. What security principles are being employed? Select two. -
ANS Authentication
Authorization
Which of the following best describes what Della could do to prevent unauthorized parties from
viewing sensitive customer information at her retail store? - ANS Use software to encrypt
data in a secure database.
Evin thinks one of the computer systems where he works may have been compromised. He
does not currently have a good way of determining if an unauthorized user logged in
successfully. Which of the following can Evin implement that will, going forward, help him
identify who logs in? - ANS Accounting
@COPYRIGHT 2026/2027 ALLRIGHTS RESERVED 1
, A friend gets a virus and asks if you can help them fix the problem. You boot the computer with
a bootable flash drive containing security-related tools and remove the virus. What type of
control did you employ? - ANS Corrective
As a consultant, you are asked by a company to help them work on a security-related project
that falls under the operational control scope. Which of the following will you help implement? -
ANS Implement security awareness training
Which of the following best describes the differences or similarities between cybersecurity and
information security? Select three. - ANS Information security falls under the cybersecurity
umbrella.
Cybersecurity primarily protects devices.
Information security protects using products, people, and procedures.
What type of entity would a threat actor most likely attack to steal design documents for a
relatively recently announced government-issued contract to design and build a missile defense
system? - ANS Enterprise
An attacker hacks into a cell phone with the intent of stealing credit card information. The
attacker also tries to extend the nefarious activity to contacts in the victim's phone, and their
contacts as well. What entity was the attacker targeting? - ANS An individual
A malicious actor lacking technical knowledge uses an attack tool to perform a sophisticated
attack. If the attacker is successful penetrating the defenses of the targeted organization, what
type of activity are they most likely to perform? Select two. - ANS Copy data
Disrupt service
@COPYRIGHT 2026/2027 ALLRIGHTS RESERVED 2
AND ANSWERS GRADED A+ 2026
You have excellent technical acumen. Part of your responsibilities where you work include
overlooking daily operations as well as analyzing and designing security solutions in a specific
area. You encounter a situation that needs to be escalated. Which of the following are you most
likely to approach with the situation? - ANS Security manager
When analyzing a security breach, Acer determines the attacker was able to change the price of
an item from $200 to $20. What security protection was compromised? - ANS Integrity
A visitor is trying to access a military base. The visitor needs to supply their license and enter
other personal information via a kiosk. The visitor is eventually allowed to enter the base but is
limited to certain areas only. What security principles are being employed? Select two. -
ANS Authentication
Authorization
Which of the following best describes what Della could do to prevent unauthorized parties from
viewing sensitive customer information at her retail store? - ANS Use software to encrypt
data in a secure database.
Evin thinks one of the computer systems where he works may have been compromised. He
does not currently have a good way of determining if an unauthorized user logged in
successfully. Which of the following can Evin implement that will, going forward, help him
identify who logs in? - ANS Accounting
@COPYRIGHT 2026/2027 ALLRIGHTS RESERVED 1
, A friend gets a virus and asks if you can help them fix the problem. You boot the computer with
a bootable flash drive containing security-related tools and remove the virus. What type of
control did you employ? - ANS Corrective
As a consultant, you are asked by a company to help them work on a security-related project
that falls under the operational control scope. Which of the following will you help implement? -
ANS Implement security awareness training
Which of the following best describes the differences or similarities between cybersecurity and
information security? Select three. - ANS Information security falls under the cybersecurity
umbrella.
Cybersecurity primarily protects devices.
Information security protects using products, people, and procedures.
What type of entity would a threat actor most likely attack to steal design documents for a
relatively recently announced government-issued contract to design and build a missile defense
system? - ANS Enterprise
An attacker hacks into a cell phone with the intent of stealing credit card information. The
attacker also tries to extend the nefarious activity to contacts in the victim's phone, and their
contacts as well. What entity was the attacker targeting? - ANS An individual
A malicious actor lacking technical knowledge uses an attack tool to perform a sophisticated
attack. If the attacker is successful penetrating the defenses of the targeted organization, what
type of activity are they most likely to perform? Select two. - ANS Copy data
Disrupt service
@COPYRIGHT 2026/2027 ALLRIGHTS RESERVED 2