Professional Assessment
QUESTIONS AND VERIFIED
CORRECT ANSWERS
GRADED A+ [LATEST] 100%
GUARANTEED PASS
Implementing a Security Awareness training program would be an example of which type of
control? - CORRECT ANSWER-Administrative Control
Requiring all employees to complete annual security awareness training is an example of which
type of control? - CORRECT ANSWER-Administrative
How would you classify a piece of malicious code that can replicate itself and spread to new
systems? - CORRECT ANSWER-A worm
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type
of attack? - CORRECT ANSWER-A Mapping Attack
An email message that is encrypted, uses a digital signature and carries a hash value would
address which aspects of the CIA Triad? - CORRECT ANSWER-Confidentiality and Integrity
, An organization wants to restrict employee after-hours access to its systems so it publishes a
policy forbidding employees to work outside of their assigned hours, and then makes sure the
office doors remain locked on weekends. What two (2) types of controls are they using? -
CORRECT ANSWER-Physical and Administrative
A penetration tester that gains access to a system without permission and then exploits it for
personal gain is said to wear what color hat? - CORRECT ANSWER-Black Hat
What is an advantage asymmetric key encryption has over symmetric key encryption? -
CORRECT ANSWER-Asymmetric keys can be exchanged more securely than symmetric keys
Which position is in charge of testing the security and effectiveness of computer information
systems? - CORRECT ANSWER-Information Security Auditor
Which position conducts information security investigations for organizations to identify threats
that could compromise the organization? - CORRECT ANSWER-Information Security Analyst
Problem Management, Change Management, and Incident Management are all key processes
of which framework? - CORRECT ANSWER-ITIL
Alice sends a message to Bob that is intercepted by Trudy. Which scenario describes an integrity
violation? - CORRECT ANSWER-Trudy changes the message and then forwards it on
In cybersecurity, Accountability is defined as what? - CORRECT ANSWER-Being able to map an
action to an identity
Which type of access control is based upon the subject's clearance level and the objects
classification? - CORRECT ANSWER-Mandatory Access Control (MAC)