Final EXAM WITH ANSWERS
Adam's company recently suffered an attack where
hackers exploited an SQL injection issue on their web
server and stole sensitive information from a database.
What term describes this activity? - CORRECT ANSWERS
✔✔Incident
Joe is responsible for the security of the industrial control
systems for a power plant. What type of environment
does Joe administer? - CORRECT ANSWERS ✔✔SCADA
What is the ALE? - CORRECT ANSWERS ✔✔Single loss *
chance
Purchasing an insurance policy is an example of the
____________ risk management strategy. - CORRECT
ANSWERS ✔✔Transfer
Alan is the security manager for a mid-sized business.
The company has suffered several serious data losses
when mobile devices were stolen. Alan decides to
implement full disk encryption on all mobile devices.
, What risk response did Alan take? - CORRECT ANSWERS
✔✔reduce
Violet deploys an intrusion prevention system (IPS) on her
network as a security control. What type of control has
Violet deployed? - CORRECT ANSWERS ✔✔Preventive
Which control is NOT an example of a fault tolerance
technique designed to avoid interruptions that would
cause downtime? - CORRECT ANSWERS ✔✔Warm site
Risk refers to the amount of harm a threat exploiting a
vulnerability can cause. - CORRECT ANSWERS ✔✔False
(its impact)
A structured walk-through test is a review of a business
continuity plan to ensure that contact numbers are
current and that the plan reflects the company's priorities
and structure. - CORRECT ANSWERS ✔✔False (its a
checklist test)
Alice and Bob would like to communicate with each other
using a session key but they do not already have a shared
secret key. Which algorithm can they use to exchange a
secret key? - CORRECT ANSWERS ✔✔Diffie-Hellman