Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

TESTBANK FOR CompTIA Security+ Guide to Network Security Fundamentals 8th Edition Ciampa

Rating
-
Sold
-
Pages
269
Grade
A+
Uploaded on
29-04-2026
Written in
2025/2026

TESTBANK FOR CompTIA Security+ Guide to Network Security Fundamentals 8th Edition Ciampa

Institution
Course

Content preview

, TESTBANK FOR CompTIA Security+ Guide to Network Security
Fundamentals 8th Edition Ciampa

Important Notes
 The file includes the complete test bank, organized chapter by chapter.
 A sample of selected pages has been provided for preview.
 All available appendices and Excel files (if included in the original resources) are
provided.
 We continuously update our files to ensure you receive the latest and most accurate
editions.
 New editions are added regularly – stay connected for updates!

✅ Why Buy From Us?
 📚 Complete & organized chapter-by-chapter – no missing content, no guessing.
 ⚡ Instant digital delivery – get your file the moment you pay, no waiting.
 📅 Always up to date – we track new editions so you always get the latest version.
 💬 Friendly support – real humans ready to help, anytime you need us.
 🔒 Safe & secure – thousands of satisfied students trust us every semester.

🛡️Our Guarantees
 💰 Money-Back Guarantee: Not satisfied? We offer a full refund – no questions asked.
 🔄 Wrong File? No Problem: Contact us and we will replace it immediately with the
correct version, free of charge.
 ⏰ 24/7 Support: We are always here – reach out anytime and expect a fast response.


Contact Email:



,Name: Class: Date:

Mod 01 Introduction to Information Security

1. You have excellent technical acumen. Part of your responsibilities where you work include
overlooking daily operations as well as analyzing and designing security solutions in a specific
area. You encounter a situation that needs to be escalated. Which of the following are you most
likely to approach with the situation?
a. CIO
b. CISO
c. Security manager
d. Security administrator

ANSWER: c
RATIONALE: The question is implying you are the security administrator so you
will most likely approach the security manager with the issue. The
security manager reports to the CISO and supervises technicians,
administrators, and security staff. The security administrator has
both technical knowledge and managerial skills. A security
administrator manages daily operations of security technology and
may analyze and design security solutions within a specific entity
as well as identify users" needs.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.2 - Summarize fundamental security concepts.
TOPICS: None specified
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

2. When analyzing a security breach, Acer determines the attacker was able to change the price
of an item from $200 to $20. What security protection was compromised?
a. Confidentiality
b. Integrity
c. Authorization
d. Authentication

ANSWER: b
RATIONALE: Integrity ensures that the information is correct and no
unauthorized person or malicious software has altered the data. An
attacker changing data, such as the price of an item, violates the
integrity of the data.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.

Copyright Cengage Learning. Powered by Cognero. Page 1

,Name: Class: Date:

Mod 01 Introduction to Information Security

ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.2 - Summarize fundamental security concepts.
TOPICS: What Is Information Security?
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

3. A visitor is trying to access a military base. The visitor needs to supply their license and enter
other personal information via a kiosk. The visitor is eventually allowed to enter the base but is
limited to certain areas only. What security principles are being employed? Select two.
a. Authentication
b. Authorization
c. Confidentiality
d. Accounting
e. Availability

ANSWER: a, b
RATIONALE: Authentication is used to verify the visitor is who they claim to be.
Authorization is used to grant the visitor permission to enter the
base because their credentials are authentic.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.2 - Summarize fundamental security concepts.
TOPICS: What Is Information Security?
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

4. Which of the following best describes what Della could do to prevent unauthorized parties
from viewing sensitive customer information at her retail store?
a. Use software to encrypt data in a secure database.
b. Verify the ID of the party requesting access to the data.
c. Limit access to certain areas once access is granted.
d. Ensure the data cannot be manipulated or changed.

ANSWER: a
RATIONALE: Confidentiality ensures that only authorized parties can view the
information. Providing confidentiality can involve several different
security tools such as using software to encrypt credit card
numbers stored on the web server or in a database, for example.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Copyright Cengage Learning. Powered by Cognero. Page 2

,Name: Class: Date:

Mod 01 Introduction to Information Security

LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.2 - Summarize fundamental security concepts.
TOPICS: What Is Information Security?
KEYWORDS: Bloom's: Apply
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

5. Evin thinks one of the computer systems where he works may have been compromised. He
does not currently have a good way of determining if an unauthorized user logged in
successfully. Which of the following can Evin implement that will, going forward, help him
identify who logs in?
a. Authentication
b. Authorization
c. Availability
d. Accounting

ANSWER: d
RATIONALE: Accounting is a component of the security principle that involves
controlling access to information. Accounting creates a record that
is preserved of who accessed the enterprise network, what
resources they accessed, and when they disconnected from the
network.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.2 - Summarize fundamental security concepts.
TOPICS: What Is Information Security?
KEYWORDS: Bloom's: Apply
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

6. A friend gets a virus and asks if you can help them fix the problem. You boot the computer
with a bootable flash drive containing security-related tools and remove the virus. What type of
control did you employ?
a. Deterrent
b. Corrective
c. Directive
d. Compensating

ANSWER: b
RATIONALE: A corrective control lessens the damage from an attack. An
example is cleaning a virus from an infected system; the corrective
action occurs after the attack has taken place.
Copyright Cengage Learning. Powered by Cognero. Page 3

,Name: Class: Date:

Mod 01 Introduction to Information Security

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.1 - Compare and contrast various types of security
controls.
TOPICS: What Is Information Security?
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

7. As a consultant, you are asked by a company to help them work on a security-related project
that falls under the operational control scope. Which of the following will you help implement?
a. Define an acceptable use policy
b. Install a card reader to access the data center
c. Install hardware to block malicious content
d. Implement security awareness training

ANSWER: d
RATIONALE: Conducting security awareness training falls under the operational
control category. This is considered a broad category that is
implemented and executed by people.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.1 - Compare and contrast various types of security
controls.
TOPICS: What Is Information Security?
KEYWORDS: Bloom's: Apply
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

8. Which of the following best describes the differences or similarities between cybersecurity and
information security? Select three.
a. Cybersecurity primarily protects devices.
b. Information security falls under the cybersecurity umbrella.
c. Cybersecurity guarantees more safety than information security.
d. Information security protects using products, people, and procedures.
e. Cybersecurity induces a lot more inconvenience than information security.

ANSWER: a, b, d
RATIONALE: Cybersecurity usually involves a range of practices, processes, and

Copyright Cengage Learning. Powered by Cognero. Page 4

,Name: Class: Date:

Mod 01 Introduction to Information Security

technologies intended to protect devices, networks, and programs
that process and store data in an electronic form. Cybersecurity is
generally considered an overall umbrella term under which
information security is found. Information security achieves
protection through a process that is a combination of three entities:
products, people, and policies and procedures.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.1 - Define information security and explain its
principles.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.1.2 - Summarize fundamental security concepts.
TOPICS: What Is Information Security?
KEYWORDS: Bloom's: Analyze
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

9. What type of entity would a threat actor most likely attack to steal design documents for a
relatively recently announced government-issued contract to design and build a missile defense
system?
a. Individual
b. Government
c. Enterprise
d. For-profit organization

ANSWER: c
RATIONALE: Government contracts are typically awarded to companies
(enterprises) with the expertise to satisfy the requirements
stipulated in the contract. Thus, the design documents for the
missile defense system would be developed by an enterprise. It
would make more sense to attack the enterprise designing the
missile defense system to try to obtain the design documents.
Considering it was announced relatively recently, the design
documents are likely in the early stages of development and still
within the physical scope of the enterprise.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.2 - Identify threat actors and their motivations.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.2.1 - Compare and contrast common threat actors
and motivations.
TOPICS: Threat Actors and Their Motivations
KEYWORDS: Bloom's: Analyze
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

10. An attacker hacks into a cell phone with the intent of stealing credit card information. The
Copyright Cengage Learning. Powered by Cognero. Page 5

,Name: Class: Date:

Mod 01 Introduction to Information Security

attacker also tries to extend the nefarious activity to contacts in the victim's phone, and their
contacts as well. What entity was the attacker targeting?
a. An enterprise
b. A competitor
c. An individual
d. A government agency

ANSWER: c
RATIONALE: A category of targets focuses on individuals as the victims. Threat actors stea
data, credit card numbers, online financial account information, or Social Sec
profit from their victims.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.2 - Identify threat actors and their motivations.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.2.1 - Compare and contrast common threat actors and motivati
TOPICS: Threat Actors and Their Motivations
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

11. A malicious actor lacking technical knowledge uses an attack tool to perform a sophisticated
attack. If the attacker is successful penetrating the defenses of the targeted organization, what
type of activity are they most likely to perform? Select two.
a. Blackmail
b. Copy data
c. Corrupt data
d. Disrupt service
e. Manipulate data

ANSWER: b, d
RATIONALE: Unskilled attackers employ easy-to-use attack tools to carry out
their attacks. They can often be successful in penetrating defenses,
particularly if the defenses are weak. Their motivation is usually
data exfiltration (unauthorized copying of data) or service
disruption (obstructing normal business electronic processes).
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.2 - Identify threat actors and their motivations.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.2.1 - Compare and contrast common threat actors
and motivations.
TOPICS: Threat Actors and Their Motivations
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM

Copyright Cengage Learning. Powered by Cognero. Page 6

,Name: Class: Date:

Mod 01 Introduction to Information Security

DATE MODIFIED: 11/30/2023 7:40 PM

12. To bypass institutional overhead, a well-intentioned networking instructor purchases a
wireless router and connects it to the network. The goal is to allow students to establish
connectivity with each other by connecting through the wireless router. In what activity did the
instructor participate?
a. APT
b. Shadow IT
c. Insider threat
d. Ethical hacking

ANSWER: b
RATIONALE: The process of bypassing corporate approval for technology
purchases, such as buying a wireless router, is known as shadow
IT. In the question, the instructor's motivation was ethical (of
sound moral principle) but, nevertheless, it weakened security.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.2 - Identify threat actors and their motivations.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.2.1 - Compare and contrast common threat actors
and motivations.
TOPICS: Threat Actors and Their Motivations
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

13. What would motivate organized crime actors to add cyberattacks to their portfolio of
malicious activities?
a. Espionage
b. Create chaos
c. Philosophical beliefs
d. Increased financial gain

ANSWER: d
RATIONALE: Evidence indicates that organized crime has moved into
cyberattacks, which they consider to be more rewarding than
traditional crimes. The motivation by organized crime is generally
financial gain.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.2 - Identify threat actors and their motivations.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.2.1 - Compare and contrast common threat actors
and motivations.
TOPICS: Threat Actors and Their Motivations
Copyright Cengage Learning. Powered by Cognero. Page 7

, Name: Class: Date:

Mod 01 Introduction to Information Security

KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

14. A criminal organization has decided to leave their traditional ways and pursue cyberattacks as
their new mode of operation. Why would they do this?
a. Easier to hide their tracks
b. Generate disruption
c. Less competition
d. Political beliefs

ANSWER: a
RATIONALE: Evidence indicates that organized crime has moved into
cyberattacks, which they consider to be less risky. This makes it
easier for them hide their tracks.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.2 - Identify threat actors and their motivations.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.2.1 - Compare and contrast common threat actors
and motivations.
TOPICS: Threat Actors and Their Motivations
KEYWORDS: Bloom's: Remember
DATE CREATED: 11/30/2023 7:40 PM
DATE MODIFIED: 11/30/2023 7:40 PM

15. A work-study student works at the registrar's office and is given limited access to a student
database. The student is very technologically savvy and figures out a way of gaining additional
privileges. The student is not pleased with one of their grades and changes it. Which of the
following best describes the type of scenario this activity characterizes?
a. Cyberterrorism
b. Insider threat
c. Shadow IT
d. Revenge

ANSWER: b
RATIONALE: A serious threat to an enterprise comes from its own employees,
contractors, and business partners, called insiders. They pose an
insider threat because the threat is coming from an entity who is in
a position of trust, so they will not be suspected.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Ciampa.Sec+8e.25.1.2 - Identify threat actors and their motivations.
ACCREDITING STANDARDS: Ciampa.SY0-701.25.2.1 - Compare and contrast common threat actors
and motivations.
Copyright Cengage Learning. Powered by Cognero. Page 8

Written for

Course

Document information

Uploaded on
April 29, 2026
Number of pages
269
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$19.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
storetestbanks ball state university
Follow You need to be logged in order to follow users or courses
Sold
263
Member since
1 year
Number of followers
4
Documents
1891
Last sold
1 day ago

Welcome to my store! I provide high-quality study materials designed to help students succeed and achieve better results. All documents are carefully organized, clear, and easy to follow. ✔ Complete test banks & study guides ✔ All chapters included ✔ Accurate and reliable content ✔ Perfect for exam preparation My goal is to make studying easier and save your time by providing everything you need in one place. Feel free to explore my collection and choose what fits your needs. Thank you for your support!

Read more Read less
4.7

38 reviews

5
32
4
2
3
3
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions