Questions with Correct Verified
Answers 2025-2026. Graded A
_____ is used to find vulnerabilities within a computer system. - ANS
Penetration testing
A company gives each employee a mobile tablet device to work from
home. The company security policy specifies all endpoint computing
devices be assigned a unique identifier so the device can be tracked. What
would help the company remain compliant with the security policy? -
ANSMDM software
A company has a network policy for updating Windows 10 using a list of
preset compliance guidelines. Which strategy would accomplish this? -
ANSUse Windows Update Baseline.
A company has remote employees working from home who need to
securely access resources on the company's private LAN. Which
technology protects traffic between the employees and the company
private LAN? - ANSIPsec
A company is working on a disaster recovery plan. They decide that it
would be more secure to subscribe to a cloud service application for their
1
,file storage and backups. Which type of cloud service do they need? -
ANSSaaS
A company located in the United States wants to enter into a business
relationship with a company located in Germany. Which legal regulatory
framework does it need to comply with in order to protect customer
privacy? - ANSGDPR
A company manages the personal data of citizens from several Eastern
Union (EU) countries. Which compliance act must they adhere to when
investigating security incidents involving EU citizens? - ANSGDPR
A company wants to prevent downtime and the likelihood of a vulnerability
being exploited. What vulnerability management solution should be used? -
ANSMitigation
A computer can run multiple _____ that run their own operating systems
and applications.
A _____ is a virtualized application that consists of its dependencies.
A _____ is software that enables multiple operating systems to run on the
same physical machine. - ANSvirtual machines
container
hypervisor
2
, A computer malware code that replicates itself on the target computer and
spreads through the network causing damage and distributing additional
harmful payloads is called a _____. - ANSvirus
A cyber technician is worried about the security of the current driver
installed on the 64-bit Windows 10 platform on a corporate laptop. The
technician tries to install an updated version of the driver that was found on
the web, but the driver fails to install. What is the issue? - ANSThe driver is
not digitally signed.
A cybersecurity technician is concerned that one of the corporate systems
in the company may have been compromised by an advanced persistent
threat (APT) type of malware. The cybersecurity technician has
quarantined the infected system and unplugged it from the network. What
should the technician do next? - ANSReinstall the operating systems and
applications and then restore the data from known good backups.
A cybersecurity technician needs to ensure that remote workers who have
limited bandwidth can download critical patches and security updates for
Windows but not feature updates. Which Windows feature will allow for
this? - ANSMetered connections
A fire occurred in the data center of your organization. Which document will
security staff consult after the fire? - ANSDisaster Recovery Plan
3