GUIDE ACTUAL EXAM PAPER 2026
QUESTIONS WITH ANSWERS GRADED A+
◍ SIEM.
Answer: Security Information and Event Manager
◍ IDS (Intrusion Detection System).
Answer: Monitors the network to detect threats. Listens passively on the
network. Alerts network admin of any detected suspicious behavior.
◍ Packet Filter Firewalls.
Answer: operates at Layers 3 and 4 of the OSI network model: network and
transport. These firewalls inspect incoming (ingress) and outgoing (egress)
traffic and compare the following attributes to a database of packet filter
rules that determine if the firewall will forward (allow) or drop (deny) the
traffic:
◍ Preparation Phase.
Answer: Planning incident response
◍ Security Operations.
Answer: Activities maintaining and monitoring security
◍ Cyber Threat Intelligence reports.
Answer: explain who might attack you, how they operate, what they target,
and what you should do about it
◍ Stateful Inspection.
Answer: Automatically creates rules to permit traffic based on
communication type. Operates at OSI layer 3-5
◍ Asymmetric Key Encryption.
, Answer: rely on two different keys to encrypt and decrypt the traffic. This is
particularly useful on the internet where the encryption of the data being
sent to and from e-commerce and banking websites is needed.
◍ Public Cloud.
Answer: are hosted by companies, such as Amazon Web Services (AWS),
Microsoft Azure, and Google Cloud Platform (GCP), and tend to offer
highly scalable, multi-tenant solutions in data centers placed around the
world.
◍ IPS (Intrusion Prevention System).
Answer: Intercepts and blocks threats. Has many network ports to operate as
input/output pairs. Has cables routed physically through devices to create
choke points.
◍ Authorization.
Answer: Define what the user can access Give permissions to a user Write
and delete or read-only
◍ Chief Information Officer (CIO).
Answer: makes sure technology works for the business-reliable systems,
smart investments, and alignment with organizational strategy
◍ Commander's Control Measures.
Answer: Screen linesSubordinate unit boundariesPhase linesContact
pointsCheckpointsObservation pointsRoutes
◍ Wi-Fi Protected Access 3 (WPA3).
Answer: latest Wi-Fi standard designed to provide stronger encryption,
improved authentication, and better protection against attacks that WPA2
◍ Attestation.
Answer: A way to prove a system is genuine, secure, and hasn't been
tampered with
◍ Log Analysis.
Answer: Examining logs for activity
, ◍ Wiretapping.
Answer: Security solution: Look for physical vulnerabilities, check the locks
on doors, racks, and wiring closets. OSI Layer: Physical (1)
◍ Security Content Automation Protocol (SCAP) Compliance Checker.
Answer: tool that automatically assesses systems against security
configuration standards and compliance requirements using the SCAP
framework
◍ Firewalls.
Answer: hardware, software, or both designed to prevent unauthorized
persons from accessing electronic information.
◍ Accounting.
Answer: Report on user's access Provides forensic trail after a security
breach Logs successful and unsuccessful connection attempts
◍ Data Loss Prevention.
Answer: Preventing data leaks
◍ Signature-based detection.
Answer: identifies threats by matching activity against known patterns,
signatures, or fingerprints of malicious behavior
◍ Ping Sweep Attack.
Answer: Security solution: Mitigate by using a packet-filtering firewall. OSI
Layer: Network (3)
◍ Application Level.
Answer: Operates at OSI Layer 7 and below, Analyzes packet content and
blocks program-level traffic.
◍ Environmental variables.
Answer: named values stored by an operating system or runtime
environment that affect how processes and applications behave
◍ Area Security.
Answer: Preserves the Commander's freedom of action to conduct