PAPER 2026 FULL QUESTIONS AND
CORRECT ANSWERS GRADED A+
● Which of the following tools is best suited to querying data provided
by organizations like the American Registry for Internet Numbers
(ARIN) as part of a footprinting or reconnaissance exercise?
A.nmap
B.traceroute
C.regmon
D.whois. Answer: D. Regional Internet registries like ARIN are best
queried either via their websites or using tools like Whois. Nmap is a
useful port scanning utility, traceroute is used for testing the path packets
take to a remote system, and regmon is an outdated Windows Registry
tool that has been supplanted by Process Monitor.
● What type of system allows attackers to believe they have succeeded
with their attack, thus providing defenders with information about their
attack methods and tools?
A.A honeypot
B.A sinkhole
C.A crackpot
, D.A darknet. Answer: A. Honeypots are systems that are designed to
look like attractive targets. When they are attacked, they simulate a
compromise, providing defenders with a chance to see how attackers
operate and what tools they use. DNS sinkholes provide false
information to malicious software, redirecting queries about command
and control systems to allow remediation. Darknets are segments of
unused network space that are monitored to detect traffic—since
legitimate traffic should never be aimed at the darknet, this can be used
to detect attacks and other unwanted traffic. Crackpots are eccentric
people—not a system you'll run into on a network.
● What cybersecurity objective could be achieved by running your
organization's web servers in redundant, geographically separate
datacenters?
A.Confidentiality
B.Integrity
C.Immutability
D.Availability. Answer: D. Redundant systems, particularly when run in
multiple locations and with other protections to ensure uptime, can help
provide availability.
● Which of the following vulnerability scanning methods will provide
the most accurate detail during a scan?
A.Black box