GUIDE FINAL TEST 2026 QUESTIONS WITH
CORRECT ANSWERS GRADED A+
◍ What is a false negative?.
Answer: A security system fails to detect a threat or malicious activity.
◍ (Picture) of Insider Threats1. What 3 types of Data Sources would you use?.
Answer: MetadataEndpoint logsNetwork logs
◍ A cybersecurity responder covertly monitors a hacker's activities to prepare
a containment and eradication plan. What threat-hunting technique entails
the responder observing the hackers activity through vantage points without
being discovered?.
Answer: Maneuvering
◍ A cybersecurity manager receives an email from the company's legal
counsel stating a court order has been issued for specific data records to be
retained. Which of the following best describes this request?.
Answer: Legal hold
◍ The IT department at a medium-sized company is exploring ways to
enhance its authentication methods to improve security. They want to
choose an authentication approach that balances security and user
convenience. Which authentication method eliminates the need for
passwords and provides a secure way of verifying a user's identity?.
Answer: Passwordless authentication
◍ Explain "Pulverizing" when it comes to Non-Digital Destruction.
Answer: Demolishing or crushing completely
◍ The security team wants to improve data access controls via rule-based and
, time-of-day restrictions. How can rule-based access controls and
time-of-day restrictions improve data access controls? (Select the two best
options.).
Answer: To define specific access rules based on employees' roles and
responsibilitiesTo restrict access to critical systems during non-working
hours to enhance security
◍ An organization is currently undergoing a major system upgrade, which
limits the ability to modify detection rules in its monitoring tools over the
next six months. During this period, the IT team needs to manage a high
volume of false positives effectively. Which of the following techniques
should be prioritized to handle the volume of alerts during this transitional
phase without changing detection rules? (Select the three best options.).
Answer: B.Muting alert levelsC.Redirecting sudden alert "floods" to a
dedicated groupD.Redirecting infrastructure-related alerts to a dedicated
group
◍ A regional bank is facing increased cyber threats and is concerned about the
security of its servers. As a security analyst, you have been asked to provide
a recommendation designed to improve the security of the servers while
maintaining full operation. Which of the following options is the MOST
effective?.
Answer: Implement a secure baseline, consistently apply updates and
patches, and adhere to hardening guidelines.
◍ What is Chain of Custody?.
Answer: Process of maintaining and documenting the handling of evidence
◍ A security administrator reviews the configuration of a newly implemented
Security Information and Event Management (SIEM) system. The SIEM
system collects and correlates data from various sources, such as network
sensors, application logs, and host logs. The administrator notices that some
network devices, like switches and routers, do not directly support the
installed agents for data collection. What approach should the administrator
consider to ensure the inclusion of these devices' logs in the SIEM system?.
, Answer: Configuring the devices to push log changes to the SIEM server
using a listener/collector approach
◍ A company recently faced a security breach through its network switch.
They learned that the attacker was able to access the switch using the default
credentials. Which of the following steps should the company take to
improve the security of the switch and avoid such breaches in the future?.
Answer: Change the default credentials of the switch
◍ The IT team of a large corporation is planning to implement a Remote
Authentication Dial-In User Service (RADIUS) to support enterprise-mode
Wi-Fi authentication. Which of the following protocols is associated with a
Wi-Fi network configured to use enterprise-mode Wi-Fi authentication?.
Answer: PEAP
◍ CVSS.
Answer: Common Vulnerability Scoring System
◍ The Chief Information Officer (CIO) wants to expand the company's ability
to accurately identify network host weaknesses across the company. What
can be used to report the total number of unmitigated vulnerabilities for each
host, and when consolidated, demonstrate results on the status of hosts
across the entire network?.
Answer: Vulnerability scanner
◍ Why is Security Alerting and Monitoring important?.
Answer: They play a vital role in detecting, responding to, and mitigating
security threats in real-time.
◍ CI.
Answer: Continuous Integration
◍ After a recent breach, an organization mandates increased monitoring of
corporate email accounts. What can the organization use that mediates the
copying of tagged data to restrict it to authorized media and services and
monitors statistics for policy violations?.
Answer: DLP