SECURITY REALEXAM QUESTIONS WITH
ANSWERS LATEST UPDATE 2025/2026
Already GRADED A+
Which is a software or hardware-based network security system that controls the
incoming and outgoing network traffic based on an applied rule set?
A IPS
B Firewall
C IDS
D Honeypot - correct answers B
What is an association of organizations that come together to exchange
appropriate information about their users and resources to enable collaborations and
transactions called?
A Identity repository
B Federation
C DAST
D ONF - correct answers B
1|Page
Page 1
,Which is not a Critical Success Factor?
A CSP responsibilities
B Order of restoration
C Identification of need to remove backups
D Customer responsibilities - correct answers C
Compensates victims for injuries suffered by the culpable action or inaction of
others.
It justifies legal rights and interests that have been compromised, diminished, or
emasculated.
Discourages injurious, careless, and risky behavior in the future. - correct answers
Tort Law
What is the first international set of privacy controls in the cloud?
3|Page
Page 2
,A ISO/IEC 27032
B ISO/IEC 27005
C ISO/IEC 27002
D ISO/IEC 27018 - correct answers D
Cloud Portability Means:
A Ability to change providers
B Ability to use anywhere
C Ability to use with mobile devices
D Ability to use on multiple device types - correct answers A
Which of the following is the science of hiding information to protect sensitive
information and communications from unauthorized access?
A Cryptography
B Social Engineering
C DDoS
5|Page
Page 3
, D Phishing - correct answers A
In the tokenization architecture, which step should be performed after the
tokenization server generates the token and stores it in the token database?
A An application collects or generates a piece of sensitive data.
B The tokenization server returns the token to the application.
C The application stores the token rather than the original data.
D Data is sent to the tokenization server; it is not stored locally. - correct answers
B
In a federated environment, who is the relying party, and what does it do?
A The relying party is the service provider; it consumes the tokens that the
customer generates.
B The relying party is the service provider; it consumes the tokens that the
identity provider generates.
7|Page
Page 4