3rd Edition Ciampa
Important Notes
The file includes the complete test bank, organized chapter by chapter.
A sample of selected pages has been provided for preview.
All available appendices and Excel files (if included in the original resources) are
provided.
We continuously update our files to ensure you receive the latest and most accurate
editions.
New editions are added regularly – stay connected for updates!
✅ Why Buy From Us?
📚 Complete & organized chapter-by-chapter – no missing content, no guessing.
⚡ Instant digital delivery – get your file the moment you pay, no waiting.
📅 Always up to date – we track new editions so you always get the latest version.
💬 Friendly support – real humans ready to help, anytime you need us.
🔒 Safe & secure – thousands of satisfied students trust us every semester.
🛡️Our Guarantees
💰 Money-Back Guarantee: Not satisfied? We offer a full refund – no questions asked.
🔄 Wrong File? No Problem: Contact us and we will replace it immediately with the
correct version, free of charge.
⏰ 24/7 Support: We are always here – reach out anytime and expect a fast response.
Contact Email:
,Name: Class: Date:
Chapter 01 Technology Underpinnings
1. An IT professional determines their five servers are operating at only 15 percent of capacity 95
percent of the time. Which of the following can help improve utilization?
a. Improve the IT infrastructure.
b. Modify the network architecture.
c. Implement virtualization.
d. Use serverless SDN containers.
ANSWER: c
RATIONALE: Virtualization is used to consolidate multiple physical servers into
virtual machines (VMs) that can run on a single physical computer.
Because a typical server uses only about 10 to 15 percent of its
capacity, multiple VMs can run on a single physical server.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Apply
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
2. Which of the following is a true statement regarding containerization?
a. It only holds the necessary OS components such as binary files and libraries.
b. It has a small footprint because it cannot share binary files.
c. It has a small footprint because it cannot share libraries.
d. It loads very quickly once the entire OS has been started and is up and running.
ANSWER: a
RATIONALE: With Type I and Type II hypervisors, the entire guest OS must be
started and fully functioning before an application can be
launched. A container, on the other hand, holds only the necessary
OS components, such as binary files and libraries, that are needed
for that specific application to run.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
Copyright Cengage Learning. Powered by Cognero. Page 1
,Name: Class: Date:
Chapter 01 Technology Underpinnings
DATE MODIFIED: 7/13/2024 3:01 PM
3. Damaris works at a company that transitioned away from provisioning, deploying, or
managing physical servers. What type of infrastructure are they most likely using?
a. Serverless because they are no longer using physical servers
b. Containers because physical servers are not needed to run them
c. Serverless infrastructure
d. Wireless infrastructure
ANSWER: c
RATIONALE: A serverless infrastructure is one in which the capacity planning,
installation, setup, and management are invisible to the user
because they are handled by another entity. Serverless means that
provisioning, deploying, and managing a physical server is not
performed by the organization. However, physical servers are used
somewhere.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
4. Which of the following best describes the ability for computing resources to be provisioned
and released with minimal management effort?
a. On-premises computing
b. Network appliances
c. Cloud computing
d. App servers
ANSWER: c
RATIONALE: Cloud computing is a model for enabling on-demand network
access to a shared pool of configurable computing resources that
can be rapidly provisioned and released with minimal management
effort or service provider interaction.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
Copyright Cengage Learning. Powered by Cognero. Page 2
,Name: Class: Date:
Chapter 01 Technology Underpinnings
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
5. In cloud computing, metered services are used for which of the following purposes?
a. To monitor the performance of cloud resources
b. To keep track of the amount of storage used in the cloud
c. To keep track of the computing resources used for billing
d. To keep track of the traffic flowing into a customer's cloud resources
ANSWER: c
RATIONALE: Metered services employ a pay-per-use model wherein customers
only pay for the cloud computing resources they utilize.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
6. A company uses IoT devices, a variety of secure database servers, computing devices, and
robotic vehicles. What are the most likely computing locations the company has adopted for
these devices? Select two.
a. Edge computing for IoT devices
b. Off-premises for the desktop computers
c. On-prem for database servers
d. Fog computing for IoT devices
e. Cloud computing for robotic vehicles
ANSWER: a, c
RATIONALE: IoT typically uses edge computing. It is at or very near to the
source of data instead of relying on the cloud or on-prem for
processing. The database servers should be on-prem for security.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
Copyright Cengage Learning. Powered by Cognero. Page 3
,Name: Class: Date:
Chapter 01 Technology Underpinnings
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
7. Which of the following best describes the differences or similarities between a jump server
and an air gap? Select two.
a. A jump server is used in a restricted area of a network called a DMZ.
b. A jump server is used to isolate a network from external sources.
c. An air gap is used in a secure area between the internal and external network.
d. An air gap server should only be accessible by a secure admin workstation.
e. An air gap server should not have USB ports or network interface cards.
ANSWER: a, e
RATIONALE: A jump server is a minimally configured administrator server
within a restricted area of the network called a demilitarized zone
(DMZ). It runs only essential protocols and ports and connects two
dissimilar security zones while providing tightly restricted access
between them. To keep a crucial network or endpoint from being
compromised, an air gap can be utilized. This isolates the network
or endpoint from all external sources, including any network
connection or external ports (like a USB port).
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
8. A company uses switches wherein the control logic for each switch is bundled with the
switching logic. What are the benefits or challenges presented by this type of network device?
a. It is more secure than the alternative because it has a reduced attack surface.
b. It facilitates automation because the critical elements of the switch are integrated.
c. It lacks the flexibility that allows an administrator to add, drop, or change resources
quickly.
d. The company cannot use switches from different vendors because they would be
incompatible.
ANSWER: c
Copyright Cengage Learning. Powered by Cognero. Page 4
,Name: Class: Date:
Chapter 01 Technology Underpinnings
RATIONALE: If a VM needs to be migrated, the manager must reconfigure the
VLAN on the switch every time the virtual server is moved. In
addition, in a large enterprise, whenever a new VM is installed, it
can take hours for managers to perform the necessary
reconfiguration. Thus, these devices lack the flexibility that would
allow an administrator to make changes quickly.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
9. After a network overhaul, an administrator is now able to manage network resources from a
central console without the need to modify individual switches. Which of the following are true
statements regarding the network?
a. Switches are capable of managing flow tables created by an SDN controller.
b. Every switch has been configured with every VLAN used by the organization.
c. New switches have been installed with an integrated control and data plane.
d. The SDN controller has been replaced with a network automation server.
ANSWER: a
RATIONALE: SDN (software-defined networking) virtualizes parts of the
physical network so that it can be more quickly and easily
reconfigured. Before traffic flows through the network, it receives
permission from the SDN controller after verification by the
network policy of the enterprise. The SDN controller computes a
route for the traffic flow and adds an entry in each of the switches
along the path. Thus, the switches simply manage flow tables
whose entries are created by the controller.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.1 - Describe infrastructure concepts and network
architectures
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
Copyright Cengage Learning. Powered by Cognero. Page 5
,Name: Class: Date:
Chapter 01 Technology Underpinnings
10. Which of the following statements best describe characteristics of IT and OT? Select two.
a. OT involves the day-to-day management of IT departments.
b. IT includes testing the security of applications and systems.
c. Automated braking is an example of a specialized ICS under the IT umbrella.
d. IT includes governance to ensure IT policies are followed as defined by individual
departments.
e. OT is used to monitor and control physical processes and devices connected to the
infrastructure.
ANSWER: b, e
RATIONALE: Operations (not to be confused with operational technology)
involve the day-to-day management of IT (information
technology) departments including testing the security of
applications and systems. Operational technology (OT) is using
hardware and software to monitor and control physical processes
and the devices connected to the infrastructure that support these
processes. OT is used in a variety of industries.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
11. Residents in an older neighborhood are being informed their electric meters will be replaced.
Even though the existing meters are working fine, which of the following best describes why the
utility company would choose to incur such an expense?
a. The new meters represent a specialized ICS that will help save the company money.
b. The battery in the new low-powered meters only needs to be replaced every five
years.
c. The new meters are part of a SCADA system allowing the meters to be networked
together.
d. The new meters are of the analog variety and support wireless technology for drive-by
reading.
ANSWER: a
RATIONALE: Older analog meters are being replaced with smart meters that
transmit meter readings periodically to the utility company. This
will end the need for an employee to visit the dwellings each
month to read the meters. This will help save the company money
as less resources, human or otherwise, are required.
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 6
,Name: Class: Date:
Chapter 01 Technology Underpinnings
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
12. Which of the following best describes the type of computerized embedded systems that
control and/or make possible automated parking and autonomous driving?
a. Specialized IT networking systems
b. Specialized ICSs
c. SCADA systems
d. IoT systems
ANSWER: b
RATIONALE: Embedded systems in cars are a type of specialized ICS (industrial
control system) that use sonar, radar, and laser emitters to control
brakes, steering, and the throttle to perform functions such as
blind-spot and pedestrian collision warnings, automated braking,
safe distance-keeping, fully automated parking, and even
autonomous driving.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Remember
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
13. Nikola wants the ability to turn the lights on and off at her home using her cell phone while at
work. Which of the following best describes the type of device Nikola should install?
a. Networking
b. Embedded
c. SCADA
d. ICS
e. IoT
ANSWER: e
RATIONALE: IoT (Internet of Things) is connecting any device to the Internet for
Copyright Cengage Learning. Powered by Cognero. Page 7
, Name: Class: Date:
Chapter 01 Technology Underpinnings
the purpose of sending and receiving data to be acted upon. Smart
lighting uses IoT technology. Thus, Nikola can receive status
information and send a signal to set the desired state remotely.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Apply
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
14. Which of the following best describes the consequences of a cybersecurity incident involving
IT systems and an incident involving OT systems? Select two.
a. Since both are typically on the same network, compromising one affects the other.
b. A successful attack on IT critical systems can cause physical harm.
c. A successful attack on IT systems can result in a DDoS.
d. A successful attack on OT systems can be deadly.
e. Both can be equally harmful.
ANSWER: c, d
RATIONALE: Whereas a cybersecurity incident involving IT (information
technology) may involve the theft of customer data or a successful
distributed denial-of-service (DDoS) attack, a successful attack on
OT (operational technology) systems can be significantly more
deadly and result in loss of life.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: CIAM.CYSA+.25.1.2 - Identify different types of operation technology
ACCREDITING STANDARDS: CIAM.CYSA.25.1.1 - Explain the importance of system and network
architecture concepts in security operations.
TOPICS: Infrastructures and Architectures
KEYWORDS: Bloom's: Analyze
DATE CREATED: 7/13/2024 3:01 PM
DATE MODIFIED: 7/13/2024 3:01 PM
15. A security analyst is looking through some files in the /etc directory on a Linux system. What
type of files can the security analyst expect to find in this directory?
a. Configuration files
b. Application files
c. Data files
d. User files
Copyright Cengage Learning. Powered by Cognero. Page 8