2026 QUESTIONS WITH SOLUTIONS
GRADED A+
◍ inquiry based learning.
Answer: involves students in the learning process through questioning,
exploration, and problem-solving, often resembling scientific method
◍ web application analysis tool.
Answer: A type of tool that analyzes web pages or web-based applications
and searches for common flaws such as XSS or SQL injection flaws, and
improperly set permissions, extraneous files, outdated software versions,
and many more such items
◍ PCI DSS (Payment Card Industry Data Security Standard).
Answer: companies that process credit card payments must comply with this
set of standards
◍ regulatory compliance.
Answer: Regulations mandated by law usually requiring regular audits and
assessments
◍ identification of critical information.
Answer: 1st step in the OPSEC process, arguably the most important: to
identify the assets that most need protection and will cause us the most harm
if exposed
◍ client-side attack.
Answer: A type of attack that takes advantage of weaknesses in the software
loaded on client machines or one that uses social engineering techniques to
trick us into going along with the attack
,◍ descriptor.
Answer: defines what performance looks like at each level of a rubric; must
be clear and detailed enough for students to understand what is expected of
them and how they can improve.
◍ containment.
Answer: taking steps to ensure that the situation does not cause any more
damage than it already has, or at the very least, lessen any ongoing harm
◍ Cognitivism.
Answer: lecture, visual tools, facilitation to memorize, multiple choice and
essay assessments. learning extends beyond the external, it is an internal
process involving short and long term memory.
◍ academic standards.
Answer: outline what students should learn and achieve at each grade level
across various subjects.
◍ objectives.
Answer: specific, measurable goals set by educators to guide student
learning toward achieving standards
◍ content scaffolding.
Answer: helps the learner figure out an answer. ex. accessing prior
knowledge, direct instruction with gradual release of responsibility
◍ CA (certificate authority).
Answer: a trusted entity that handles digital certificates
◍ heuristics.
Answer: the process of anomaly detection used by anti-malware tools to
detect malware without signatures
◍ scope and sequence.
Answer: charts the progression of standards, specifying instruction order and
timing
◍ pre-assessment.
, Answer: initial stage involves methods like screening tests, diagnostic
assessments, and pre-tests, which help educators understand students'
baseline knowledge before instruction begins
◍ Falsifying Identification.
Answer: Authentication requirements help prevent this crime
◍ Tier 1 interventions.
Answer: high quality classroom instruction that ensures the curriculum
reaches 100% of students in the classroom.
◍ discovery/experiential learning.
Answer: learning strategies involving students in active engagement through
real-world experiences, exploration, and reflection.
◍ tcpdump (WinDump for Windows).
Answer: classic, command-line sniffing tool that monitors network
activities, filters traffic, and moreruns on UNIX systems
◍ acceptability.
Answer: A measure of how agreeable a particular characteristic is to the
users of a system
◍ connectivism.
Answer: self-directed quest for content, sharing of content and sources,
spontaneous learning groups, collaborative knowledge creation. learning is
self-directed, networked via nodes (content sources, people, groups)
◍ BYOD (bring your own device).
Answer: a phrase that refers to an organization's strategy and policies
regarding the use of personal vs. corporate devices
◍ authentication.
Answer: a set of methods we use to establish a claim of identity as being
truecorroborates the identity of an entity, whether it is the sender, the
sender's computer, some device, or some information
◍ zone of proximal development.
, Answer: difference between what a learner can do without help and what
they can do with guidance and encouragement from a skilled partner.
◍ MDM (mobile device management).
Answer: a solution that manages security elements for mobile devices in the
workplace
◍ availability, residual data, backups.
Answer: Name the 3 main considerations for protecting data
◍ metacognitive scaffolding.
Answer: helps the learner to be aware of his/her own learning through
reflection, monitoring, and self-assessment. ex. self-assessment of
understanding, reflective journaling
◍ deterrent controls.
Answer: Controls designed to discourage those who might seek to violate
our security controls
◍ rubric.
Answer: a detailed guide that helps teachers assess the quality of students'
work based on defined criteria, covering various levels of achievement from
basic to advanced.
◍ analysis of vulnerabilities.
Answer: 3rd step in the OPSEC process: to look at the weaknesses that can
be used to harm us
◍ national standards.
Answer: a cohesive set of educational guidelines that outline what students
across the entire country should know and be able to achieve in various
subject areas.
◍ transparency and clarity.
Answer: elements that ensure the criteria used to assess students are clear
and understandable, making the assessment process fair and transparent
◍ performance based assessment.